{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:04:13Z","timestamp":1730325853900,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","funder":[{"name":"PETRAS","award":["RoasT-IoT"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,11]]},"DOI":"10.1145\/3560835.3564552","type":"proceedings-article","created":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T21:38:26Z","timestamp":1667943506000},"page":"25-34","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Preventing or Mitigating Adversarial Supply Chain Attacks"],"prefix":"10.1145","author":[{"given":"Kaspar Rosager","family":"Ludvigsen","sequence":"first","affiliation":[{"name":"University of Newcastle and University of Strathclyde, Newcastle and Glasgow, United Kingdom"}]},{"given":"Shishir","family":"Nagaraja","sequence":"additional","affiliation":[{"name":"University of Newcastle, Newcastle, United Kingdom"}]},{"given":"Angela","family":"Daly","sequence":"additional","affiliation":[{"name":"University of Dundee, Dundee, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"143","article-title":"Teleoperated Surgical Robot Security: Challenges and Solutions\". en. In: Advances in Web Technologies and Engineering. Ed. by Xiali Hei","author":"Al Momin Md Abdullah","year":"2022","unstructured":"Md Abdullah Al Momin and Md Nazmul Islam . \" Teleoperated Surgical Robot Security: Challenges and Solutions\". en. In: Advances in Web Technologies and Engineering. Ed. by Xiali Hei . IGI Global , 2022 , pp. 143 -- 160 . isbn: 978--1--79987--323--5 978--1--79987--325--9. doi: 10.4018\/978--1--7998--7323--5.ch009. url: http:\/\/services.igi-global.com\/resolvedoi\/resolve. aspx?doi=10.4018\/978--1--7998--7323--5.ch009 (visited on 07\/19\/2022). 10.4018\/978--1--7998--7323--5.ch009 Md Abdullah Al Momin and Md Nazmul Islam. \"Teleoperated Surgical Robot Security: Challenges and Solutions\". en. In: Advances in Web Technologies and Engineering. Ed. by Xiali Hei. IGI Global, 2022, pp. 143--160. isbn: 978--1--79987--323--5 978--1--79987--325--9. doi: 10.4018\/978--1--7998--7323--5.ch009. url: http:\/\/services.igi-global.com\/resolvedoi\/resolve. aspx?doi=10.4018\/978--1--7998--7323--5.ch009 (visited on 07\/19\/2022).","journal-title":"IGI Global"},{"volume-title":"Computers in Human Behavior 114 (Jan.","year":"2021","author":"Nisreen Ameen","key":"e_1_3_2_1_2_1","unstructured":"Nisreen Ameen et al. \" Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce\". en . In: Computers in Human Behavior 114 (Jan. 2021 ), p. 106531. issn: 07475632. doi: 10.1016\/j.chb.2020.106531. url: https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563220302831 (visited on 07\/24\/2022). 10.1016\/j.chb.2020.106531 Nisreen Ameen et al. \"Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce\". en. In: Computers in Human Behavior 114 (Jan. 2021), p. 106531. issn: 07475632. doi: 10.1016\/j.chb.2020.106531. url: https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563220302831 (visited on 07\/24\/2022)."},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"A Political History of Digital Encryption\". en","author":"Anderson Patrick D.","year":"2021","unstructured":"Patrick D. Anderson . \" Review of Crypto Wars-The Fight for Privacy in the Digital Age : A Political History of Digital Encryption\". en . In : Cryptologia (Dec . 2021 ), pp. 1 -- 14 . issn: 0161--1194, 1558--1586. doi: 10.1080\/01611194.2021.2002977. url: https:\/\/www.tandfonline. com\/doi\/full\/10.1080\/01611194.2021.2002977 (visited on 08\/04\/2022). 10.1080\/01611194.2021.2002977 Patrick D. Anderson. \"Review of Crypto Wars-The Fight for Privacy in the Digital Age: A Political History of Digital Encryption\". en. In: Cryptologia (Dec. 2021), pp. 1--14. issn: 0161--1194, 1558--1586. doi: 10.1080\/01611194.2021.2002977. url: https:\/\/www.tandfonline. com\/doi\/full\/10.1080\/01611194.2021.2002977 (visited on 08\/04\/2022)."},{"key":"e_1_3_2_1_4_1","first-page":"449","volume-title":"Governance 31.3 (July","author":"Sergei Boeke. \"National cyber crisis management","year":"2018","unstructured":"Sergei Boeke. \"National cyber crisis management : Different European approaches\". en . In: Governance 31.3 (July 2018 ), pp. 449 -- 464 . issn: 09521895. doi: 10.1111\/gove.12309. url: https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/gove.12309 (visited on 07\/24\/2022). 10.1111\/gove.12309 Sergei Boeke. \"National cyber crisis management: Different European approaches\". en. In: Governance 31.3 (July 2018), pp. 449--464. issn: 09521895. doi: 10.1111\/gove.12309. url: https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/gove.12309 (visited on 07\/24\/2022)."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots\". In","author":"Tamara Bonaci","year":"2015","unstructured":"Tamara Bonaci et al. \" To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots\". In : ( 2015 ). _eprint: 1504.04339, pp. 1 -- 11 . url: http:\/\/arxiv.org\/abs\/1504.04339. Tamara Bonaci et al. \"To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots\". In: (2015). _eprint: 1504.04339, pp. 1--11. url: http:\/\/arxiv.org\/abs\/1504.04339."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-161r1-draft2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1007\/978-3-319-78440-3_38","volume-title":"The Palgrave Handbook of International Cybercrime and Cyberdeviance. Ed. by Thomas J. Holt and Adam M. Bossler. Cham","author":"Bull\u00e9e Jan-Willem","year":"2020","unstructured":"Jan-Willem Bull\u00e9e and Marianne Junger . \" Social Engineering\". en . In: The Palgrave Handbook of International Cybercrime and Cyberdeviance. Ed. by Thomas J. Holt and Adam M. Bossler. Cham : Springer International Publishing , 2020 , pp. 849 -- 875 . isbn: 978--3--319--78439- 7 978--3--319--78440--3. doi: 10.1007\/978--3--319--78440--3_38. url: http:\/\/link.springer.com\/10. 1007\/978--3--319--78440--3_38 (visited on 07\/19\/2022). 10.1007\/978--3--319--78440--3_38 Jan-Willem Bull\u00e9e and Marianne Junger. \"Social Engineering\". en. In: The Palgrave Handbook of International Cybercrime and Cyberdeviance. Ed. by Thomas J. Holt and Adam M. Bossler. Cham: Springer International Publishing, 2020, pp. 849--875. isbn: 978--3--319--78439- 7 978--3--319--78440--3. doi: 10.1007\/978--3--319--78440--3_38. url: http:\/\/link.springer.com\/10. 1007\/978--3--319--78440--3_38 (visited on 07\/19\/2022)."},{"volume-title":"Building resilient medical technology supply chains with a software bill of materials\". en. In: npj Digital Medicine 4.1 (Dec","year":"2021","author":"Seth Carmody","key":"e_1_3_2_1_8_1","unstructured":"Seth Carmody et al. \" Building resilient medical technology supply chains with a software bill of materials\". en. In: npj Digital Medicine 4.1 (Dec . 2021 ), p. 34. issn: 2398--6352. doi: 10.1038\/s41746-021-00403-w. url: http:\/\/www.nature.com\/articles\/s41746-021-00403-w (visited on 09\/07\/2022). 10.1038\/s41746-021-00403-w Seth Carmody et al. \"Building resilient medical technology supply chains with a software bill of materials\". en. In: npj Digital Medicine 4.1 (Dec. 2021), p. 34. issn: 2398--6352. doi: 10.1038\/s41746-021-00403-w. url: http:\/\/www.nature.com\/articles\/s41746-021-00403-w (visited on 09\/07\/2022)."},{"key":"e_1_3_2_1_9_1","first-page":"430","volume-title":"Journal of Cyber Policy 3.3 (Sept.","author":"Carr Madeline","year":"2018","unstructured":"Madeline Carr and Leonie Maria Tanczer . \" UK cybersecurity industrial policy : an analysis of drivers, market failures and interventions\". en . In: Journal of Cyber Policy 3.3 (Sept. 2018 ), pp. 430 -- 444 . issn: 2373--8871, 2373--8898. doi: 10.1080\/23738871.2018.1550523. url: https: \/ \/www. tandfonline. com \/ doi \/ full \/10 .1080 \/23738871 .2018.1550523 (visited on 07\/24\/2022). 10.1080\/23738871.2018.1550523 Madeline Carr and Leonie Maria Tanczer. \"UK cybersecurity industrial policy: an analysis of drivers, market failures and interventions\". en. In: Journal of Cyber Policy 3.3 (Sept. 2018), pp. 430--444. issn: 2373--8871, 2373--8898. doi: 10.1080\/23738871.2018.1550523. url: https: \/ \/www. tandfonline. com \/ doi \/ full \/10 .1080 \/23738871 .2018.1550523 (visited on 07\/24\/2022)."},{"key":"e_1_3_2_1_10_1","first-page":"115","volume-title":"International Cybersecurity Law Review 3.1 (June","author":"Casarosa Federica","year":"2022","unstructured":"Federica Casarosa . \" Cybersecurity certification of Artificial Intelligence : a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act\". en . In: International Cybersecurity Law Review 3.1 (June 2022 ), pp. 115 -- 130 . issn: 2662--9720, 2662- 9739. doi: 10.1365\/s43439-021-00043--6. url: https:\/\/link.springer.com\/10.1365\/s43439-021- 00043--6 (visited on 07\/19\/2022). 10.1365\/s43439-021-00043--6 Federica Casarosa. \"Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act\". en. In: International Cybersecurity Law Review 3.1 (June 2022), pp. 115--130. issn: 2662--9720, 2662- 9739. doi: 10.1365\/s43439-021-00043--6. url: https:\/\/link.springer.com\/10.1365\/s43439-021- 00043--6 (visited on 07\/19\/2022)."},{"key":"e_1_3_2_1_11_1","first-page":"19","article-title":"Cyber Supply Chain Risk Management:Toward a Global Vision of Transparency and Trust. Tech. rep","author":"Charney Scott","year":"2011","unstructured":"Scott Charney and Eric T Werner . Cyber Supply Chain Risk Management:Toward a Global Vision of Transparency and Trust. Tech. rep . Microsoft , 2011 , p. 19 . url: http:\/\/download. microsoft.com\/download\/3\/8\/4\/384483BA- B7B3- 4F2F- 9366- E83E4C7562D6\/Cyber% 20Supply%20Chain%20Risk%20Management%20white%20paper.pdf. Scott Charney and Eric T Werner. Cyber Supply Chain Risk Management:Toward a Global Vision of Transparency and Trust. Tech. rep. Microsoft, 2011, p. 19. url: http:\/\/download. microsoft.com\/download\/3\/8\/4\/384483BA- B7B3- 4F2F- 9366- E83E4C7562D6\/Cyber% 20Supply%20Chain%20Risk%20Management%20white%20paper.pdf.","journal-title":"Microsoft"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781400845293"},{"volume-title":"Supply Chain Management 27.1","year":"2022","author":"Alessandro Creazza","key":"e_1_3_2_1_13_1","unstructured":"Alessandro Creazza et al. \" Who cares? Supply chain managers' perceptions regarding cyber supply chain risk management in the digital transformation era\". en . In: Supply Chain Management 27.1 ( 2022 ), p. 24. Alessandro Creazza et al. \"Who cares? Supply chain managers' perceptions regarding cyber supply chain risk management in the digital transformation era\". en. In: Supply Chain Management 27.1 (2022), p. 24."},{"volume-title":"Cyberwarfare & the Solarwinds sunburst hack\". en","year":"2021","author":"Datta Pratim","key":"e_1_3_2_1_14_1","unstructured":"Pratim Datta . \" Hannibal at the gates : Cyberwarfare & the Solarwinds sunburst hack\". en . In : Journal of Information Technology Teaching Cases (Mar . 2021 ), p. 204388692199312. issn: 2043--8869, 2043--8869. doi: 10.1177\/2043886921993126. url: http:\/\/journals.sagepub.com\/ doi\/10.1177\/2043886921993126 (visited on 09\/07\/2022). 10.1177\/2043886921993126 Pratim Datta. \"Hannibal at the gates : Cyberwarfare & the Solarwinds sunburst hack\". en. In: Journal of Information Technology Teaching Cases (Mar. 2021), p. 204388692199312. issn: 2043--8869, 2043--8869. doi: 10.1177\/2043886921993126. url: http:\/\/journals.sagepub.com\/ doi\/10.1177\/2043886921993126 (visited on 09\/07\/2022)."},{"volume-title":"Sensors 20.18 (Sept.","year":"2020","author":"Chen Dong","key":"e_1_3_2_1_15_1","unstructured":"Chen Dong et al. \" Hardware Trojans in Chips: A Survey for Detection and Prevention\". en . In: Sensors 20.18 (Sept. 2020 ), p. 5165. issn: 1424--8220. doi: 10.3390\/s20185165. url: https:\/\/www.mdpi.com\/1424--8220\/20\/18\/5165 (visited on 08\/05\/2022). 10.3390\/s20185165 Chen Dong et al. \"Hardware Trojans in Chips: A Survey for Detection and Prevention\". en. In: Sensors 20.18 (Sept. 2020), p. 5165. issn: 1424--8220. doi: 10.3390\/s20185165. url: https:\/\/www.mdpi.com\/1424--8220\/20\/18\/5165 (visited on 08\/05\/2022)."},{"volume-title":"Santa Clara High Technology Law Journal 36.4","year":"2020","author":"Duan Charles","key":"e_1_3_2_1_16_1","unstructured":"Charles Duan . \" OF MONOPOLIES AND MONOCULTURES : THE INTERSECTION OF PATENTS AND NATIONAL SECURITY\". en . In: Santa Clara High Technology Law Journal 36.4 ( 2020 ), p. 39. Charles Duan. \"OF MONOPOLIES AND MONOCULTURES: THE INTERSECTION OF PATENTS AND NATIONAL SECURITY\". en. In: Santa Clara High Technology Law Journal 36.4 (2020), p. 39."},{"volume-title":"A Competition Law Perspective","year":"2019","author":"Economides Nick","key":"e_1_3_2_1_17_1","unstructured":"Nick Economides and Ioannis Lianos . \" Restrictions on Privacy and Exploitation in the Digital Economy : A Competition Law Perspective \". In : CLES Research Paper Series ( 2019 ). Nick Economides and Ioannis Lianos. \"Restrictions on Privacy and Exploitation in the Digital Economy: A Competition Law Perspective\". In: CLES Research Paper Series (2019)."},{"key":"e_1_3_2_1_18_1","first-page":"879","volume-title":"Nuclear Engineering and Technology 53.3","author":"Eggers Shannon","year":"2021","unstructured":"Shannon Eggers . \" A novel approach for analyzing the nuclear supply chain cyber-attack surface\". In: Nuclear Engineering and Technology 53.3 ( 2021 ). Publisher : Elsevier Ltd , pp. 879 -- 887 . issn: 2234358X. doi: 10.1016\/j.net.2020.08.021. url: https:\/\/doi.org\/10.1016\/j.net.2020. 08.021. 10.1016\/j.net.2020.08.021 Shannon Eggers. \"A novel approach for analyzing the nuclear supply chain cyber-attack surface\". In: Nuclear Engineering and Technology 53.3 (2021). Publisher: Elsevier Ltd, pp. 879-- 887. issn: 2234358X. doi: 10.1016\/j.net.2020.08.021. url: https:\/\/doi.org\/10.1016\/j.net.2020. 08.021."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.13182\/T122-32483"},{"key":"e_1_3_2_1_20_1","first-page":"267","volume-title":"Cryptologia 23.3 (July","author":"Ellis J. H.","year":"1999","unstructured":"J. H. Ellis . \" THE HISTORY OF NON-SECRET ENCRYPTION\". en . In: Cryptologia 23.3 (July 1999 ), pp. 267 -- 273 . issn: 0161--1194, 1558--1586. doi: 10.1080 \/0161- 119991887919. url: http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/0161--119991887919 (visited on 08\/04\/2022). J. H. Ellis. \"THE HISTORY OF NON-SECRET ENCRYPTION\". en. In: Cryptologia 23.3 (July 1999), pp. 267--273. issn: 0161--1194, 1558--1586. doi: 10.1080 \/0161- 119991887919. url: http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/0161--119991887919 (visited on 08\/04\/2022)."},{"volume-title":"rep. 1.4. Symantec","year":"2011","author":"Falliere Nicolas","key":"e_1_3_2_1_21_1","unstructured":"Nicolas Falliere , Liam O. Murchu , and Eric Chien . W32. Stuxnet Dossier . Tech. rep. 1.4. Symantec , 2011 . Nicolas Falliere, Liam O. Murchu, and Eric Chien. W32.Stuxnet Dossier. Tech. rep. 1.4. Symantec, 2011."},{"issue":"1","key":"e_1_3_2_1_22_1","article-title":"Is Brexit Ripping up the Unwritten Constitution of the United Kingdom?","volume":"11","author":"Frosini Justin O.","year":"2019","unstructured":"Justin O. Frosini . \" Is Brexit Ripping up the Unwritten Constitution of the United Kingdom? \" In: Italian Journal of Public Law 11 . 1 ( 2019 ). Justin O. Frosini. \"Is Brexit Ripping up the Unwritten Constitution of the United Kingdom?\" In: Italian Journal of Public Law 11.1 (2019).","journal-title":"Italian Journal of Public Law"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5195\/TLP.2014.146"},{"issue":"2","key":"e_1_3_2_1_24_1","article-title":"CYBERSECURITY FOR INFRASTRUCTURE: A CRITICAL ANALYSIS","volume":"44","author":"Haber Eldar","year":"2017","unstructured":"Eldar Haber and Tal Zarsky . \" CYBERSECURITY FOR INFRASTRUCTURE: A CRITICAL ANALYSIS \". In: Florida State University Law Review 44 . 2 ( 2017 ). Eldar Haber and Tal Zarsky. \"CYBERSECURITY FOR INFRASTRUCTURE: A CRITICAL ANALYSIS\". In: Florida State University Law Review 44.2 (2017).","journal-title":"Florida State University Law Review"},{"key":"e_1_3_2_1_25_1","first-page":"285","volume-title":"Internet Histories 1.4 (Sept.","author":"Hellegren Z. Isadora","year":"2017","unstructured":"Z. Isadora Hellegren . \" A history of crypto-discourse : encryption as a site of struggles to define internet freedom\". en . In: Internet Histories 1.4 (Sept. 2017 ), pp. 285 -- 311 . issn: 2470--1475, 2470--1483. doi: 10.1080\/24701475.2017.1387466. url: https:\/\/www.tandfonline. com\/doi\/full\/10.1080\/24701475.2017.1387466 (visited on 08\/04\/2022). 10.1080\/24701475.2017.1387466 Z. Isadora Hellegren. \"A history of crypto-discourse: encryption as a site of struggles to define internet freedom\". en. In: Internet Histories 1.4 (Sept. 2017), pp. 285--311. issn: 2470--1475, 2470--1483. doi: 10.1080\/24701475.2017.1387466. url: https:\/\/www.tandfonline. com\/doi\/full\/10.1080\/24701475.2017.1387466 (visited on 08\/04\/2022)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31239-8_6"},{"volume-title":"Misaligned Union laws\" A comparative analysis of certification in the Cybersecurity Act and the General Data Protection Regulation. en","year":"2021","author":"Kamara Irene","key":"e_1_3_2_1_27_1","unstructured":"Irene Kamara . Misaligned Union laws\" A comparative analysis of certification in the Cybersecurity Act and the General Data Protection Regulation. en . 2021 . Irene Kamara. Misaligned Union laws\" A comparative analysis of certification in the Cybersecurity Act and the General Data Protection Regulation. en. 2021."},{"volume-title":"en","year":"2019","author":"Kilovaty Ido","key":"e_1_3_2_1_28_1","unstructured":"Ido Kilovaty . \" Privatized Cybersecurity Law\". en . In : SSRN Electronic Journal ( 2019 ). issn: 1556--5068. doi: 10.2139\/ssrn.3338155. url: https:\/\/www.ssrn.com\/abstract=3338155 (visited on 07\/24\/2022). 10.2139\/ssrn.3338155 Ido Kilovaty. \"Privatized Cybersecurity Law\". en. In: SSRN Electronic Journal (2019). issn: 1556--5068. doi: 10.2139\/ssrn.3338155. url: https:\/\/www.ssrn.com\/abstract=3338155 (visited on 07\/24\/2022)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015ICI0001"},{"volume-title":"Bergen Journal of Criminal Law & Criminal Justice 10.1 (May","year":"2022","author":"Korkka-Knuts Heli","key":"e_1_3_2_1_30_1","unstructured":"Heli Korkka-Knuts . \" Behaviourally informed approach to corporate criminal law : Ethicality as efficiency\". en . In: Bergen Journal of Criminal Law & Criminal Justice 10.1 (May 2022 ), p. 30. issn: 1894--4183. doi: 10.15845\/bjclcj.v10i1.3689. url: https:\/\/boap.uib.no\/index.php\/ BJCLCJ\/article\/view\/3689 (visited on 09\/06\/2022). 10.15845\/bjclcj.v10i1.3689 Heli Korkka-Knuts. \"Behaviourally informed approach to corporate criminal law: Ethicality as efficiency\". en. In: Bergen Journal of Criminal Law & Criminal Justice 10.1 (May 2022), p. 30. issn: 1894--4183. doi: 10.15845\/bjclcj.v10i1.3689. url: https:\/\/boap.uib.no\/index.php\/ BJCLCJ\/article\/view\/3689 (visited on 09\/06\/2022)."},{"key":"e_1_3_2_1_31_1","first-page":"3","volume-title":"13th International Workshop on Agents and Data Mining Interaction.","author":"LaGreca Elizabeth","year":"2017","unstructured":"Elizabeth LaGreca and Chutima Boonthum-Denecke . \" Survey on the Insecurity of the Internet of Things\". en . In: 13th International Workshop on Agents and Data Mining Interaction. 2017 , p. 3 . Elizabeth LaGreca and Chutima Boonthum-Denecke. \"Survey on the Insecurity of the Internet of Things\". en. In: 13th International Workshop on Agents and Data Mining Interaction. 2017, p. 3."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/202709"},{"volume-title":"American Criminal Law Review 57.2","year":"2020","author":"Robert Luskin. ?'Caring about Corp","key":"e_1_3_2_1_33_1","unstructured":"Robert Luskin. ?'Caring about Corp orate ' Due Care' : Why Criminal Respondeat Superior Liability Outreaches Its Justification\". en . In: American Criminal Law Review 57.2 ( 2020 ), p. 29. Robert Luskin. ?'Caring about Corporate 'Due Care': Why Criminal Respondeat Superior Liability Outreaches Its Justification\". en. In: American Criminal Law Review 57.2 (2020), p. 29."},{"key":"e_1_3_2_1_34_1","first-page":"1267","volume-title":"International Review of the Red Cross 104.919 (Apr.","author":"Marelli Massimo","year":"2022","unstructured":"Massimo Marelli . \" The SolarWinds hack : Lessons for international humanitarian organizations\". en . In: International Review of the Red Cross 104.919 (Apr. 2022 ), pp. 1267 -- 1284 . issn: 1816--3831, 1607--5889. doi: 10.1017\/S1816383122000194. url: https:\/\/www.cambridge.org\/ core\/product\/identifier\/S1816383122000194\/type\/journal_article (visited on 07\/19\/2022). 10.1017\/S1816383122000194 Massimo Marelli. \"The SolarWinds hack: Lessons for international humanitarian organizations\". en. In: International Review of the Red Cross 104.919 (Apr. 2022), pp. 1267--1284. issn: 1816--3831, 1607--5889. doi: 10.1017\/S1816383122000194. url: https:\/\/www.cambridge.org\/ core\/product\/identifier\/S1816383122000194\/type\/journal_article (visited on 07\/19\/2022)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.48"},{"key":"e_1_3_2_1_36_1","first-page":"519","volume-title":"TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation 15.3","author":"Meland Per H\u00c1kon","year":"2021","unstructured":"Per H\u00c1kon Meland \" A Retrospective Analysis of Maritime Cyber Security Incidents\". en . In: TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation 15.3 ( 2021 ), pp. 519 -- 530 . issn: 2083--6473. doi: 10.12716 \/1001.15.03.04. url: http: \/ \/www. transnav.eu \/Article_A_Retrospective_Analysis_ of_Maritime_Cyber_ Security _Incidents_Meland,59,1144.html (visited on 08\/05\/2022). Per H\u00c1kon Meland et al. \"A Retrospective Analysis of Maritime Cyber Security Incidents\". en. In: TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation 15.3 (2021), pp. 519--530. issn: 2083--6473. doi: 10.12716 \/1001.15.03.04. url: http: \/ \/www. transnav.eu \/Article_A_Retrospective_Analysis_ of_Maritime_Cyber_ Security_Incidents_Meland,59,1144.html (visited on 08\/05\/2022)."},{"key":"e_1_3_2_1_37_1","first-page":"86","volume-title":"MITRE","author":"Miller John F","year":"2013","unstructured":"John F Miller . Supply Chain Attack Framework and Attack Patterns. Tech. rep. December 2013 . MITRE , 2013 , p. 86 . url: https:\/\/apps.dtic.mil\/sti\/pdfs\/ADA610495.pdf. John F Miller. Supply Chain Attack Framework and Attack Patterns. Tech. rep. December 2013. MITRE, 2013, p. 86. url: https:\/\/apps.dtic.mil\/sti\/pdfs\/ADA610495.pdf."},{"key":"e_1_3_2_1_38_1","first-page":"322","volume-title":"2020 IEEE International Conference on Industrial Technology (ICIT). Buenos Aires, Argentina: IEEE","author":"Javier","year":"2020","unstructured":"Javier de las Morenas et al. \"Security Experiences in IoT based applications for Building and Factory Automation\". en . In: 2020 IEEE International Conference on Industrial Technology (ICIT). Buenos Aires, Argentina: IEEE , Feb. 2020 , pp. 322 -- 327 . isbn: 978--1--72815--754--2. doi: 10.1109\/ICIT45562.2020.9067229. url: https:\/\/ieeexplore.ieee.org\/document\/9067229\/ (visited on 07\/25\/2022). 10.1109\/ICIT45562.2020.9067229 Javier de las Morenas et al. \"Security Experiences in IoT based applications for Building and Factory Automation\". en. In: 2020 IEEE International Conference on Industrial Technology (ICIT). Buenos Aires, Argentina: IEEE, Feb. 2020, pp. 322--327. isbn: 978--1--72815--754--2. doi: 10.1109\/ICIT45562.2020.9067229. url: https:\/\/ieeexplore.ieee.org\/document\/9067229\/ (visited on 07\/25\/2022)."},{"first-page":"6","volume-title":"(2019)","author":"H","key":"e_1_3_2_1_39_1","unstructured":"H D Nguyen et al. \"Industrial Internet of Things, Big Data, and Artificial Intelligence in the Smart Factory: a survey and perspective\". en . In: (2019) , p. 6 . H D Nguyen et al. \"Industrial Internet of Things, Big Data, and Artificial Intelligence in the Smart Factory: a survey and perspective\". en. In: (2019), p. 6."},{"key":"e_1_3_2_1_40_1","first-page":"1","article-title":"rep","author":"Cyber-Physical Systems NSF.","year":"2014","unstructured":"NSF. Cyber-Physical Systems . Tech . rep . National Science Foundation , 2014 , pp. 1 -- 20 . NSF. Cyber-Physical Systems. Tech. rep. National Science Foundation, 2014, pp. 1--20.","journal-title":"National Science Foundation"},{"key":"e_1_3_2_1_41_1","first-page":"67","volume-title":"en","author":"O'Malley Pat","year":"2009","unstructured":"Pat O'Malley . \" Theorizing fines\". en . In : Punishment & Society 11.1 ( Jan. 2009 ), pp. 67 -- 83 . issn: 1462--4745, 1741--3095. doi: 10.1177\/1462474508098133. url: http:\/\/journals.sagepub. com\/doi\/10.1177\/1462474508098133 (visited on 07\/19\/2022). 10.1177\/1462474508098133 Pat O'Malley. \"Theorizing fines\". en. In: Punishment & Society 11.1 (Jan. 2009), pp. 67--83. issn: 1462--4745, 1741--3095. doi: 10.1177\/1462474508098133. url: http:\/\/journals.sagepub. com\/doi\/10.1177\/1462474508098133 (visited on 07\/19\/2022)."},{"key":"e_1_3_2_1_42_1","first-page":"61","volume-title":"Journal of Criminology and Criminal Law 60.1","author":"Pisaric Milana","year":"2022","unstructured":"Milana Pisaric . \" Communications Encryption as an Investigative Obstacle\". en . In: Journal of Criminology and Criminal Law 60.1 ( 2022 ), pp. 61 -- 74 . ( Visited on 08\/04\/2022). Milana Pisaric. \"Communications Encryption as an Investigative Obstacle\". en. In: Journal of Criminology and Criminal Law 60.1 (2022), pp. 61--74. (Visited on 08\/04\/2022)."},{"volume-title":"Dec.","year":"2021","key":"e_1_3_2_1_43_1","unstructured":"PricewaterhouseCoopers. Conti cyber attack on the HSE. Independent Post Incident Review. HSE Board in conjunction with the CEO and Executive Management Team , Dec. 2021 . PricewaterhouseCoopers. Conti cyber attack on the HSE. Independent Post Incident Review. HSE Board in conjunction with the CEO and Executive Management Team, Dec. 2021."},{"key":"e_1_3_2_1_44_1","first-page":"88","article-title":"Supply Chain Attack Patterns : Framework and Catalog. Tech. rep","author":"Reed Melinda","year":"2014","unstructured":"Melinda Reed , John F Miller , and Paul Popick . Supply Chain Attack Patterns : Framework and Catalog. Tech. rep . OFFICE OF THE DEPUTY ASSISTANT SECRETARY OF DEFENSE FOR SYSTEMS ENGINEERING , 2014 , p. 88 . url: https:\/\/citeseerx.ist.psu.edu\/viewdoc\/ download?doi=10.1.1.648.6043&rep=rep1&type=pdf. Melinda Reed, John F Miller, and Paul Popick. Supply Chain Attack Patterns : Framework and Catalog. Tech. rep. OFFICE OF THE DEPUTY ASSISTANT SECRETARY OF DEFENSE FOR SYSTEMS ENGINEERING, 2014, p. 88. url: https:\/\/citeseerx.ist.psu.edu\/viewdoc\/ download?doi=10.1.1.648.6043&rep=rep1&type=pdf.","journal-title":"OFFICE OF THE DEPUTY ASSISTANT SECRETARY OF DEFENSE FOR SYSTEMS ENGINEERING"},{"key":"e_1_3_2_1_45_1","first-page":"3538704","volume-title":"ACM Computing Surveys (May","author":"Shanto","year":"2022","unstructured":"Shanto Roy et al. \"Survey and Taxonomy of Adversarial Reconnaissance Techniques\". en . In: ACM Computing Surveys (May 2022 ), p. 3538704 . issn: 0360-0300, 1557--7341. doi: 10.1145\/3538704. url: https:\/\/dl.acm.org\/doi\/10.1145\/3538704. 10.1145\/3538704 Shanto Roy et al. \"Survey and Taxonomy of Adversarial Reconnaissance Techniques\". en. In: ACM Computing Surveys (May 2022), p. 3538704. issn: 0360-0300, 1557--7341. doi: 10.1145\/3538704. url: https:\/\/dl.acm.org\/doi\/10.1145\/3538704."},{"key":"e_1_3_2_1_46_1","first-page":"349","volume-title":"European Journal for Security Research 5.2 (Oct.","author":"Ruohonen Jukka","year":"2020","unstructured":"Jukka Ruohonen . \" An Acid Test for Europeanization : Public Cyber Security Procurement in the European Union\". en . In: European Journal for Security Research 5.2 (Oct. 2020 ), pp. 349 -- 377 . issn: 2365-0931, 2365--1695. doi: 10.1007\/s41125- 019- 00053- w. url: http: \/\/link.springer.com\/10.1007\/s41125-019-00053-w (visited on 09\/07\/2022). 10.1007\/s41125- Jukka Ruohonen. \"An Acid Test for Europeanization: Public Cyber Security Procurement in the European Union\". en. In: European Journal for Security Research 5.2 (Oct. 2020), pp. 349--377. issn: 2365-0931, 2365--1695. doi: 10.1007\/s41125- 019- 00053- w. url: http: \/\/link.springer.com\/10.1007\/s41125-019-00053-w (visited on 09\/07\/2022)."},{"key":"e_1_3_2_1_47_1","first-page":"129","volume-title":"The Denning Law Journal 2.1 (Oct.","author":"Hon Lord Scarman The Rt","year":"2012","unstructured":"The Rt Hon Lord Scarman . \" Human Rights in an Unwritten Constitution\". en . In: The Denning Law Journal 2.1 (Oct. 2012 ), pp. 129 -- 135 . issn: 0269--1922. doi: 10.5750\/dlj.v2i1.163. url: http:\/\/www.ubplj.org\/index.php\/dlj\/article\/view\/163 (visited on 08\/03\/2022). 10.5750\/dlj.v2i1.163 The Rt Hon Lord Scarman. \"Human Rights in an Unwritten Constitution\". en. In: The Denning Law Journal 2.1 (Oct. 2012), pp. 129--135. issn: 0269--1922. doi: 10.5750\/dlj.v2i1.163. url: http:\/\/www.ubplj.org\/index.php\/dlj\/article\/view\/163 (visited on 08\/03\/2022)."},{"volume-title":"A COMPARISON OF \"VOLUNTARY\" CYBERSECURITY FRAMEWORKS\". en. In: 16","year":"2016","author":"Shackelford J","key":"e_1_3_2_1_48_1","unstructured":"J Shackelford , Scott Russell , and Jeffrey Haut . \" BOTTOMS UP : A COMPARISON OF \"VOLUNTARY\" CYBERSECURITY FRAMEWORKS\". en. In: 16 ( 2016 ), p. 45. J Shackelford, Scott Russell, and Jeffrey Haut. \"BOTTOMS UP: A COMPARISON OF \"VOLUNTARY\" CYBERSECURITY FRAMEWORKS\". en. In: 16 (2016), p. 45."},{"volume-title":"Journal of Criminal Law and Criminology 72.2","year":"1981","author":"W Allen Spurgeon and Terence P Fagan. \"Criminal Liability for Life-Endangering Corp","key":"e_1_3_2_1_49_1","unstructured":"W Allen Spurgeon and Terence P Fagan. \"Criminal Liability for Life-Endangering Corp orate Conduct\". en . In: Journal of Criminal Law and Criminology 72.2 ( 1981 ), p. 35. W Allen Spurgeon and Terence P Fagan. \"Criminal Liability for Life-Endangering Corporate Conduct\". en. In: Journal of Criminal Law and Criminology 72.2 (1981), p. 35."},{"volume-title":"Executive Order on America's Supply Chains: A Year of Action and Progresss. Tech. rep","year":"2022","author":"Sullivan Jake","key":"e_1_3_2_1_50_1","unstructured":"Jake Sullivan and Brian Deese . Executive Order on America's Supply Chains: A Year of Action and Progresss. Tech. rep . White House , 2022 , cyber. url: https:\/\/www.whitehouse.gov\/wpcontent\/uploads\/2022\/02\/Capstone-Report-Biden.pdf. Jake Sullivan and Brian Deese. Executive Order on America's Supply Chains: A Year of Action and Progresss. Tech. rep. White House, 2022, cyber. url: https:\/\/www.whitehouse.gov\/wpcontent\/uploads\/2022\/02\/Capstone-Report-Biden.pdf."},{"key":"e_1_3_2_1_51_1","first-page":"162","volume-title":"Kaohsiung","author":"Suryotrisongko Hatma","year":"2019","unstructured":"Hatma Suryotrisongko and Yasuo Musashi . \" Review of Cybersecurity Research Topics , Taxonomy and Challenges: Interdisciplinary Perspective\". en . In: Kaohsiung , Taiwan : IEEE, Nov. 2019 , pp. 162 -- 167 . (Visited on 08\/04\/2022) Hatma Suryotrisongko and Yasuo Musashi. \"Review of Cybersecurity Research Topics, Taxonomy and Challenges: Interdisciplinary Perspective\". en. In: Kaohsiung, Taiwan: IEEE, Nov. 2019, pp. 162--167. (Visited on 08\/04\/2022)"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560835.3564552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T04:43:07Z","timestamp":1673066587000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560835.3564552"}},"subtitle":["A Legal Analysis"],"short-title":[],"issued":{"date-parts":[[2022,11,8]]},"references-count":51,"alternative-id":["10.1145\/3560835.3564552","10.1145\/3560835"],"URL":"https:\/\/doi.org\/10.1145\/3560835.3564552","relation":{},"subject":[],"published":{"date-parts":[[2022,11,8]]},"assertion":[{"value":"2022-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}