{"id":"https://openalex.org/W2182844561","doi":"https://doi.org/10.1109/cns.2015.7346843","title":"PLC Guard: A practical defense against attacks on cyber-physical systems","display_name":"PLC Guard: A practical defense against attacks on cyber-physical systems","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W2182844561","doi":"https://doi.org/10.1109/cns.2015.7346843","mag":"2182844561"},"language":"en","primary_location":{"id":"doi:10.1109/cns.2015.7346843","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2015.7346843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065227703","display_name":"Jan-Ole Malchow","orcid":null},"institutions":[{"id":"https://openalex.org/I4210088001","display_name":"Identity","ror":"https://ror.org/008869j48","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210088001"]},{"id":"https://openalex.org/I75951250","display_name":"Freie Universit\u00e4t Berlin","ror":"https://ror.org/046ak2485","country_code":"DE","type":"education","lineage":["https://openalex.org/I75951250"]}],"countries":["DE","US"],"is_corresponding":true,"raw_author_name":"Jan-Ole Malchow","raw_affiliation_strings":["Secure Identity Research Group, Freie Universitat Berlin"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Secure Identity Research Group, Freie Universitat Berlin","institution_ids":["https://openalex.org/I75951250","https://openalex.org/I4210088001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107844966","display_name":"Daniel Marzin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210088001","display_name":"Identity","ror":"https://ror.org/008869j48","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210088001"]},{"id":"https://openalex.org/I75951250","display_name":"Freie Universit\u00e4t Berlin","ror":"https://ror.org/046ak2485","country_code":"DE","type":"education","lineage":["https://openalex.org/I75951250"]}],"countries":["DE","US"],"is_corresponding":false,"raw_author_name":"Daniel Marzin","raw_affiliation_strings":["Secure Identity Research Group, Freie Universitat Berlin"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Secure Identity Research Group, Freie Universitat Berlin","institution_ids":["https://openalex.org/I75951250","https://openalex.org/I4210088001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004666549","display_name":"Johannes Klick","orcid":null},"institutions":[{"id":"https://openalex.org/I4210088001","display_name":"Identity","ror":"https://ror.org/008869j48","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210088001"]},{"id":"https://openalex.org/I75951250","display_name":"Freie Universit\u00e4t Berlin","ror":"https://ror.org/046ak2485","country_code":"DE","type":"education","lineage":["https://openalex.org/I75951250"]}],"countries":["DE","US"],"is_corresponding":false,"raw_author_name":"Johannes Klick","raw_affiliation_strings":["Secure Identity Research Group, Freie Universitat Berlin"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Secure Identity Research Group, Freie Universitat Berlin","institution_ids":["https://openalex.org/I75951250","https://openalex.org/I4210088001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046643602","display_name":"R\u00f3bert Kov\u00e1cs","orcid":"https://orcid.org/0000-0002-9427-2861"},"institutions":[{"id":"https://openalex.org/I143288331","display_name":"Hasso Plattner Institute","ror":"https://ror.org/058rn5r42","country_code":"DE","type":"facility","lineage":["https://openalex.org/I143288331","https://openalex.org/I176453806"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Robert Kovacs","raw_affiliation_strings":["THasso-Plattner-Institut f\u00fcr Softwaresystemtechnik GmbH"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"THasso-Plattner-Institut f\u00fcr Softwaresystemtechnik GmbH","institution_ids":["https://openalex.org/I143288331"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052211172","display_name":"Volker R\u00f6th","orcid":"https://orcid.org/0000-0003-0991-0273"},"institutions":[{"id":"https://openalex.org/I4210088001","display_name":"Identity","ror":"https://ror.org/008869j48","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210088001"]},{"id":"https://openalex.org/I75951250","display_name":"Freie Universit\u00e4t Berlin","ror":"https://ror.org/046ak2485","country_code":"DE","type":"education","lineage":["https://openalex.org/I75951250"]}],"countries":["DE","US"],"is_corresponding":false,"raw_author_name":"Volker Roth","raw_affiliation_strings":["Secure Identity Research Group, Freie Universitat Berlin"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Secure Identity Research Group, Freie Universitat Berlin","institution_ids":["https://openalex.org/I75951250","https://openalex.org/I4210088001"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5065227703"],"corresponding_institution_ids":["https://openalex.org/I4210088001","https://openalex.org/I75951250"],"apc_list":null,"apc_paid":null,"fwci":3.9532,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.93816926,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.8688426613807678},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6819158792495728},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6179317235946655},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4549746513366699},{"id":"https://openalex.org/keywords/workstation","display_name":"Workstation","score":0.43130019307136536},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36013561487197876},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.216263085603714},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.1775093376636505}],"concepts":[{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.8688426613807678},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6819158792495728},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6179317235946655},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4549746513366699},{"id":"https://openalex.org/C67953723","wikidata":"https://www.wikidata.org/wiki/Q192525","display_name":"Workstation","level":2,"score":0.43130019307136536},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36013561487197876},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.216263085603714},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.1775093376636505},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns.2015.7346843","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2015.7346843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W38537450","https://openalex.org/W59698883","https://openalex.org/W191839766","https://openalex.org/W289576237","https://openalex.org/W1600958094","https://openalex.org/W1816130922","https://openalex.org/W1969685458","https://openalex.org/W1981108270","https://openalex.org/W1993090666","https://openalex.org/W1995790716","https://openalex.org/W2002578057","https://openalex.org/W2004832663","https://openalex.org/W2057049321","https://openalex.org/W2059212462","https://openalex.org/W2065076704","https://openalex.org/W2068693276","https://openalex.org/W2085379628","https://openalex.org/W2089944128","https://openalex.org/W2095881341","https://openalex.org/W2103526356","https://openalex.org/W2115398138","https://openalex.org/W2124015544","https://openalex.org/W2125355672","https://openalex.org/W2166153683","https://openalex.org/W2170277810","https://openalex.org/W4250018184","https://openalex.org/W6601553728","https://openalex.org/W6602390208","https://openalex.org/W6607933944","https://openalex.org/W6610310773","https://openalex.org/W6677135450","https://openalex.org/W6678269034"],"related_works":["https://openalex.org/W2045348955","https://openalex.org/W2352028719","https://openalex.org/W2584886384","https://openalex.org/W2378667902","https://openalex.org/W2791088446","https://openalex.org/W2052769075","https://openalex.org/W4206808270","https://openalex.org/W2166936983","https://openalex.org/W4243136610","https://openalex.org/W2155665570"],"abstract_inverted_index":{"Modern":[0],"societies":[1],"critically":[2],"depend":[3],"on":[4,170,206],"cyberphysical":[5],"systems":[6,20],"that":[7,46,113,150],"control":[8],"most":[9],"production":[10],"processes":[11],"and":[12,49,90,105,130,136,184],"utility":[13],"distribution":[14],"networks.":[15],"Unfortunately,":[16],"many":[17],"of":[18,65,75,127],"these":[19,38],"are":[21,30,47,71],"vulnerable":[22],"to":[23,36,62,97,111,154,166,189],"attacks,":[24],"particularly":[25],"advanced":[26],"ones.":[27],"While":[28],"researchers":[29],"investigating":[31],"sophisticated":[32],"techniques":[33],"in":[34,164],"order":[35,165,188],"counter":[37],"risks,":[39],"there":[40],"is":[41,95,151],"a":[42,91,98,116,134,147,160,198],"need":[43],"for":[44],"solutions":[45],"practical":[48],"readily":[50],"deployable.":[51],"In":[52,176,187],"this":[53,177],"paper,":[54,178],"we":[55,179,196],"adapt":[56],"the":[57,63,100,103,107,122,144,181],"classic":[58],"ACCAT":[59],"Guard":[60,81,162],"concept":[61],"protection":[64],"programmable":[66],"logic":[67],"controllers":[68],"(PLCs),":[69],"which":[70],"an":[72,109],"essential":[73],"ingredient":[74],"existing":[76],"cyber-physical":[77],"systems.":[78],"A":[79],"PLC":[80,161,193],"intercepts":[82,102],"traffic":[83],"between":[84],"a,":[85],"potentially":[86],"compromised,":[87],"engineering":[88],"workstation":[89],"PLC.":[92],"Whenever":[93],"code":[94,114,194],"transferred":[96],"PLC,":[99],"guard":[101,120],"transfer":[104,145],"gives":[106],"engineer":[108],"opportunity":[110],"compare":[112],"with":[115],"previous":[117],"version.":[118],"The":[119],"supports":[121],"comparison":[123],"through":[124],"various":[125],"levels":[126],"graphical":[128],"abstraction":[129],"summarization.":[131],"By":[132],"operating":[133],"simple":[135],"familiar":[137],"interface,":[138],"engineers":[139],"can":[140],"approve":[141],"or":[142],"reject":[143],"using":[146],"trusted":[148],"device":[149],"significantly":[152],"harder":[153],"subvert":[155],"by":[156],"attackers.":[157],"We":[158],"developed":[159],"prototype":[163],"reify":[167],"our":[168],"ideas":[169],"how":[171],"it":[172],"should":[173],"be":[174],"designed.":[175],"describe":[180],"guard's":[182],"design":[183],"its":[185],"implementation.":[186],"arrive":[190],"at":[191],"realistic":[192],"examples,":[195],"implemented":[197],"miniature":[199],"packaging":[200],"plant":[201],"as":[202,204],"well":[203],"attacks":[205],"it.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":2}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
