{"id":"https://openalex.org/W4387321760","doi":"https://doi.org/10.1145/3607199.3607221","title":"SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring","display_name":"SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring","publication_year":2023,"publication_date":"2023-10-03","ids":{"openalex":"https://openalex.org/W4387321760","doi":"https://doi.org/10.1145/3607199.3607221"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607221","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607221","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607221","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107974690","display_name":"S.K. Park","orcid":"https://orcid.org/0009-0001-4296-3687"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"funder","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sangbin Park","raw_affiliation_strings":["Korea University, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Korea University, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101645200","display_name":"Youngjoon Kim","orcid":"https://orcid.org/0000-0003-3131-0215"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"funder","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Youngjoon Kim","raw_affiliation_strings":["Korea University, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Korea University, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100436315","display_name":"Dong Hoon Lee","orcid":"https://orcid.org/0000-0003-0692-2543"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"funder","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Dong Hoon Lee","raw_affiliation_strings":["Korea University, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Korea University, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.202,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":4,"citation_normalized_percentile":{"value":0.492949,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":89},"biblio":{"volume":"11","issue":null,"first_page":"547","last_page":"563"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9966,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9966,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9908,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.7810478},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7784828},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5928342},{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.50299996},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38455027},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3675611},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35390258},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32099068},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1920239},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607221","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607221","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607221","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607221","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.43,"display_name":"Affordable and clean energy"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W2080573945","https://openalex.org/W2135274013","https://openalex.org/W2297774820","https://openalex.org/W2535751405","https://openalex.org/W2559990582","https://openalex.org/W2607252733","https://openalex.org/W2794073659","https://openalex.org/W2891240227","https://openalex.org/W2900644580","https://openalex.org/W2914982603","https://openalex.org/W2990924520","https://openalex.org/W3014094413","https://openalex.org/W3109892785","https://openalex.org/W3116568908","https://openalex.org/W3137265271","https://openalex.org/W3187461039","https://openalex.org/W3207753336","https://openalex.org/W4213060883","https://openalex.org/W4226048085","https://openalex.org/W4226284095","https://openalex.org/W4324007084"],"related_works":["https://openalex.org/W4390399609","https://openalex.org/W4200520489","https://openalex.org/W3147767149","https://openalex.org/W2952348651","https://openalex.org/W2375742443","https://openalex.org/W2153990583","https://openalex.org/W2149381099","https://openalex.org/W2061536531","https://openalex.org/W193873054","https://openalex.org/W1483190388"],"abstract_inverted_index":{"There":[0],"are":[1],"many":[2],"various":[3,100,168],"data-oriented":[4,81,101,113,169,214],"attacks":[5,102,114],"on":[6,109,175],"robotic":[7],"vehicles":[8],"(RVs)":[9],"that":[10,56,67,93,103,112,133,154,203,230],"change":[11,116],"the":[12,27,29,50,77,110,117,129,136,176],"inputs":[13],"of":[14,80,119,138,149,179,213],"an":[15,41],"RV":[16,42,123],"control":[17,106,124],"program.":[18],"While":[19],"much":[20],"research":[21],"has":[22,32],"been":[23],"dedicated":[24],"to":[25,60,163,225],"detecting":[26],"attacks,":[28],"recovery":[30,38,52],"mechanism":[31],"received":[33],"relatively":[34],"less":[35],"attention.":[36],"Without":[37],"after":[39],"detection,":[40],"cannot":[43],"continue":[44],"with":[45],"its":[46],"assigned":[47],"missions.":[48],"Unfortunately,":[49],"existing":[51],"mechanisms":[53],"have":[54],"limitations":[55],"make":[57],"it":[58,191,231],"difficult":[59],"deploy":[61],"these":[62,85],"in":[63,122],"real":[64],"RVs,":[65],"such":[66],"they":[68],"require":[69],"additional":[70],"hardware/software":[71],"or":[72,183],"can":[73,134,155,192,205],"only":[74,219],"recover":[75,98,166,209],"from":[76,99,145,167,210],"limited":[78],"types":[79,212],"attacks.":[82,170,215],"To":[83],"overcome":[84],"limitations,":[86],"we":[87,143],"propose":[88],"a":[89,147,180,187,196],"framework":[90],"called":[91],"SCVMON":[92,126,171,204,217],"detects":[94],"and":[95,160,165,190,208,223],"helps":[96],"RVs":[97],"generate":[104],"inappropriate":[105],"commands.":[107],"Based":[108],"observation":[111],"inevitably":[115],"values":[118],"some":[120],"variables":[121,131,152],"programs,":[125],"systematically":[127],"identifies":[128],"safety-critical":[130,151],"(SCVs)":[132],"affect":[135],"safety":[137],"RVs.":[139,235],"For":[140],"efficient":[141],"recovery,":[142],"extract":[144],"SCVs":[146],"set":[148],"monitored":[150],"(mSCVs)":[153],"reflect":[156],"all":[157],"input":[158],"changes,":[159],"monitor":[161],"them":[162],"detect":[164,207],"does":[172],"not":[173],"depend":[174],"physical":[177],"nature":[178],"specific":[181],"sensor":[182],"hardware,":[184],"which":[185],"is":[186,232],"significant":[188],"benefit,":[189],"be":[193],"applied":[194],"through":[195],"simple":[197],"software":[198],"update.":[199],"Our":[200],"evaluation":[201],"shows":[202],"quickly":[206],"20":[211],"Also,":[216],"incurs":[218],"0.3%":[220],"storage":[221],"overhead":[222],"up":[224],"5.1%":[226],"runtime":[227],"overhead,":[228],"proving":[229],"suitable":[233],"for":[234]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4387321760","counts_by_year":[{"year":2024,"cited_by_count":4}],"updated_date":"2025-02-21T13:14:17.707915","created_date":"2023-10-04"}