{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:44:27Z","timestamp":1740102267111,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607226","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"499-512","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2419-9221","authenticated-orcid":false,"given":"Andrei","family":"Bytes","sequence":"first","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5236-6579","authenticated-orcid":false,"given":"Prashant Hari Narayan","family":"Rajput","sequence":"additional","affiliation":[{"name":"NYU Tandon School of Engineering, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2479-8187","authenticated-orcid":false,"given":"Constantine","family":"Doumanidis","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6899-0651","authenticated-orcid":false,"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0594-0432","authenticated-orcid":false,"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8424-2602","authenticated-orcid":false,"given":"Nils Ole","family":"Tippenhauer","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/www.codesys.com\/products\/codesys-runtime\/control.html [Online","author":"CODESYS","year":"2023","unstructured":"2021. CODESYS Runtime (Brochure). https:\/\/www.codesys.com\/products\/codesys-runtime\/control.html [Online; accessed 25. Jan. 2023]."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00013"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1326304.1326313"},{"key":"e_1_3_2_1_4_1","unstructured":"Armis. 2019. URGENT\/11 \u2013 11 zero day vulnerabilities impacting billions of mission-critical devices."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11836810_25"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.884359"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471864"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_9_1","volume-title":"d.]. CodeMeter US-Cert. https:\/\/us-cert.cisa.gov\/ics\/advisories\/icsa-20-203-01 [Online","author":"CISA.","year":"2021","unstructured":"CISA. [n. d.]. CodeMeter US-Cert. https:\/\/us-cert.cisa.gov\/ics\/advisories\/icsa-20-203-01 [Online; accessed 20. Aug. 2021]."},{"key":"e_1_3_2_1_10_1","volume-title":"HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Clements A","year":"2020","unstructured":"Abraham\u00a0A Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, and Mathias Payer. 2020. HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1201\u20131218. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/clements"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488028"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of USENIX Workshop on Offensive Technologies (WOOT). USENIX Association.","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. 2020. AFL++: Combining Incremental Steps of Fuzzing Research. In Proceedings of USENIX Workshop on Offensive Technologies (WOOT). USENIX Association."},{"volume-title":"Detecting PLC control corruption via on-device runtime verification. In 2016 Resilience Week (RWS)","author":"Garcia Luis","key":"e_1_3_2_1_13_1","unstructured":"Luis Garcia, Saman Zonouz, Dong Wei, and Leandro\u00a0Pfleger De\u00a0Aguiar. 2016. Detecting PLC control corruption via on-device runtime verification. In 2016 Resilience Week (RWS). IEEE, 67\u201372."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23313"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28865-9_18"},{"volume-title":"d.]. Peach Fuzzer. https:\/\/peachtech.gitlab.io\/peach-fuzzer-community\/ [Online","year":"2023","key":"e_1_3_2_1_16_1","unstructured":"GitLab. [n. d.]. Peach Fuzzer. https:\/\/peachtech.gitlab.io\/peach-fuzzer-community\/ [Online; accessed 7. Feb. 2023]."},{"key":"e_1_3_2_1_17_1","volume-title":"d.]. CODESYS Device Directory. https:\/\/www.codesys.com\/download\/download-center.html [Online","author":"CODESYS Group","year":"2021","unstructured":"CODESYS Group. [n. d.]. CODESYS Device Directory. https:\/\/www.codesys.com\/download\/download-center.html [Online ; Accessed: September 2021]."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106245"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2013.6497785"},{"key":"e_1_3_2_1_20_1","volume-title":"d.]. Python bindings for libradamsa. https:\/\/github.com\/tsundokul\/pyradamsa [Online","author":"Helin Aki","year":"2022","unstructured":"Aki Helin. [n. d.]. Python bindings for libradamsa. https:\/\/github.com\/tsundokul\/pyradamsa [Online ; Accessed: January 2022]."},{"key":"e_1_3_2_1_21_1","volume-title":"IronGate ICS malware: Nothing to see here... Masking malicious activity on SCADA systems. FireEye threat research blog","author":"Homan J","year":"2016","unstructured":"J Homan, Sean McBride, and R Caldwell. 2016. IronGate ICS malware: Nothing to see here... Masking malicious activity on SCADA systems. FireEye threat research blog (2016)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics4040995"},{"key":"e_1_3_2_1_23_1","volume-title":"Jetset: Targeted Firmware Rehosting for Embedded Systems. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Johnson Evan","year":"2021","unstructured":"Evan Johnson, Maxwell Bland, YiFei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, and Kirill Levchenko. 2021. Jetset: Targeted Firmware Rehosting for Embedded Systems. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 321\u2013338. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/johnson"},{"key":"e_1_3_2_1_24_1","unstructured":"JSOF Tech. 2020. Ripple 20 \u2013 19 Zero-Day Vulnerabilities Amplified by the Supply Chain."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23074"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23271"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358227"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218603"},{"key":"e_1_3_2_1_30_1","volume-title":"d.]. CVE List. https:\/\/cve.mitre.org\/cgi-bin\/cvekey.cgi?keyword=Codesys [Online","author":"MITRE.","year":"2023","unstructured":"MITRE. [n. d.]. CVE List. https:\/\/cve.mitre.org\/cgi-bin\/cvekey.cgi?keyword=Codesys [Online ; Accessed: January 2023]."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.23919\/AE.2017.8053600"},{"key":"e_1_3_2_1_32_1","volume-title":"Security research: CODESYS Runtime, a PLC control framework. Part 1. https:\/\/ics-cert.kaspersky.com\/reports\/2019\/09\/18\/security-research-codesys-runtime-a-plc-control-framework-part-1 [Online","author":"Nochvay A.","year":"2021","unstructured":"A. Nochvay. 2019. Security research: CODESYS Runtime, a PLC control framework. Part 1. https:\/\/ics-cert.kaspersky.com\/reports\/2019\/09\/18\/security-research-codesys-runtime-a-plc-control-framework-part-1 [Online; accessed 20. Aug. 2021]."},{"key":"e_1_3_2_1_33_1","unstructured":"A. Nochvay. 2019. Security research: CODESYS Runtime a PLC control framework. Part 2. https:\/\/ics-cert.kaspersky.com\/publications\/reports\/2019\/09\/18\/security-research-codesys-runtime-a-plc-control-framework-part-2\/#_Toc16177444 [Online; accessed 20. Aug. 2021]."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"e_1_3_2_1_35_1","volume-title":"d.]. Frida: Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.https:\/\/frida.re\/ [Online","author":"Ravn\u00e5s Ole","year":"2022","unstructured":"Ole Andr\u00e9\u00a0V. Ravn\u00e5s. [n. d.]. Frida: Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.https:\/\/frida.re\/ [Online; accessed 26. Jul. 2022]."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMAPP.2018.8460287"},{"key":"e_1_3_2_1_37_1","volume-title":"d.]. CodeMeter from Wibu-Systems. https:\/\/www.wibu.com\/products\/codemeter.html [Online","author":"Systems WIBU","year":"2021","unstructured":"WIBU Systems. [n. d.]. CodeMeter from Wibu-Systems. https:\/\/www.wibu.com\/products\/codemeter.html [Online; accessed 20. Aug. 2021]."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of USENIX Security Symposium (USENIX Security). USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/tychalas","author":"Tychalas Dimitrios","year":"2021","unstructured":"Dimitrios Tychalas, Hadjer Benkraouda, and Michail Maniatakos. 2021. ICSFuzz: Manipulating I\/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications. In Proceedings of USENIX Security Symposium (USENIX Security). USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/tychalas"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the Singapore Cyber-Security Conference (SG-CRC)","author":"Urbina David","year":"2016","unstructured":"David Urbina, Jairo Giraldo, Nils\u00a0Ole Tippenhauer, and Alvaro Cardenas. 2016. Attacking fieldbus communications in ICS: Applications to the SWaT testbed. In Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016. IOS Press, 75\u201389."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00034"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586321"}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:38:34Z","timestamp":1729075114000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":41,"alternative-id":["10.1145\/3607199.3607226","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607226","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}