{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:43:21Z","timestamp":1725810201290},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,4,9]]},"DOI":"10.1145\/2461446.2461456","type":"proceedings-article","created":{"date-parts":[[2013,4,9]],"date-time":"2013-04-09T12:19:32Z","timestamp":1365509972000},"page":"65-74","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["S3A"],"prefix":"10.1145","author":[{"given":"Sibin","family":"Mohan","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Stanley","family":"Bak","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Emiliano","family":"Betti","sequence":"additional","affiliation":[{"name":"University of Rome, Rome, Italy"}]},{"given":"Heechul","family":"Yun","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Lui","family":"Sha","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Marco","family":"Caccamo","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,4,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ABRAMS M. AND WEISS J. Malicious control system cyber security attack case study - maroochy water services. http:\/\/crc.nist.gov\/groups\/SMA\/fisma\/ics\/documents\/Maroochy-Water-Services-Case-Study_report.pdf 2008. ABRAMS M. AND WEISS J. Malicious control system cyber security attack case study - maroochy water services. http:\/\/crc.nist.gov\/groups\/SMA\/fisma\/ics\/documents\/Maroochy-Water-Services-Case-Study_report.pdf 2008."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2009.20"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.202"},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX Security (Aug","author":"CHECKOWAY S.","year":"2011","unstructured":"CHECKOWAY , S. , MCCOY , D. , KANTOR , B. , ANDERSON , D. , SHACHAM , H. , SAVAGE , S. , KOSCHER , K. , CZESKIS , A. , ROESNER , F. , AND KOHNO , T. Comprehensive experimental analyses of automotive attack surfaces . In USENIX Security (Aug 2011 ). CHECKOWAY, S., MCCOY, D., KANTOR, B., ANDERSON, D., SHACHAM, H., SAVAGE, S., KOSCHER, K., CZESKIS, A., ROESNER, F., AND KOHNO, T. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security (Aug 2011)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1338441.1338673"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.17"},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/w32_stuxnet_dossier.pdf","author":"FALLIERE N.","year":"2011","unstructured":"FALLIERE , N. , MURCHU , L. , AND (SYMANTE C), E . C. W32.stuxnet dossier. http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/w32_stuxnet_dossier.pdf , 2011 . FALLIERE, N., MURCHU, L., AND (SYMANTEC), E. C. W32.stuxnet dossier. http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/w32_stuxnet_dossier.pdf, 2011."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945464"},{"key":"e_1_3_2_1_9_1","volume-title":"Inverted pendulum {ip} linear. Quanser IP01","author":"INDUSTRIAL Q.","year":"2011","unstructured":"INDUSTRIAL , Q. Inverted pendulum {ip} linear. Quanser IP01 , 2011 . INDUSTRIAL, Q. Inverted pendulum {ip} linear. Quanser IP01, 2011."},{"key":"e_1_3_2_1_10_1","unstructured":"INTEL. Using the RDTSC instruction for performance modeling. www.ccsl.carleton.ca\/~jamuir\/rdtscpm1.pdf. INTEL. Using the RDTSC instruction for performance modeling. www.ccsl.carleton.ca\/~jamuir\/rdtscpm1.pdf."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"IYER R. K. DABROWSKI P. NAKKA N. AND KALBARCZYK Z. Reconfigurable tamper-resistant hardware support against insider threats: The trusted illiac approach. 133--152. 10.1007\/978-0-387-77322-3_8. IYER R. K. DABROWSKI P. NAKKA N. AND KALBARCZYK Z. Reconfigurable tamper-resistant hardware support against insider threats: The trusted illiac approach. 133--152. 10.1007\/978-0-387-77322-3_8.","DOI":"10.1007\/978-0-387-77322-3_8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.23"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_14_1","first-page":"150","volume-title":"2011 13th IEEE International Conference on (june","author":"LI C.","year":"2011","unstructured":"LI , C. , RAGHUNATHAN , A. , AND JHA , N. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In e-Health Networking Applications and Services (Healthcom) , 2011 13th IEEE International Conference on (june 2011 ), pp. 150 -- 156 . LI, C., RAGHUNATHAN, A., AND JHA, N. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In e-Health Networking Applications and Services (Healthcom), 2011 13th IEEE International Conference on (june 2011), pp. 150--156."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2008.19"},{"key":"e_1_3_2_1_17_1","unstructured":"(NERC) N. A. E. R. C. Jan-june 2009 disturbance index. http:\/\/www.nerc.com\/files\/disturb09-January-June.pdf 2009. (NERC) N. A. E. R. C. Jan-june 2009 disturbance index. http:\/\/www.nerc.com\/files\/disturb09-January-June.pdf 2009."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095812"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.1998.648619"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2001.936213"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1347375.1347389"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133373.1133423"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1795194.1795210"}],"event":{"name":"HiCoNS '13: 2nd ACM International Conference on High Confidence Networked Systems","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Philadelphia Pennsylvania USA","acronym":"HiCoNS '13"},"container-title":["Proceedings of the 2nd ACM international conference on High confidence networked systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2461446.2461456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T11:15:36Z","timestamp":1673349336000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2461446.2461456"}},"subtitle":["secure system simplex architecture for enhanced security and robustness of cyber-physical systems"],"short-title":[],"issued":{"date-parts":[[2013,4,9]]},"references-count":22,"alternative-id":["10.1145\/2461446.2461456","10.1145\/2461446"],"URL":"https:\/\/doi.org\/10.1145\/2461446.2461456","relation":{},"subject":[],"published":{"date-parts":[[2013,4,9]]},"assertion":[{"value":"2013-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}