{"id":"https://openalex.org/W3208265074","doi":"https://doi.org/10.1109/icccnt51525.2021.9579879","title":"R0fuzz: A Collaborative Fuzzer for ICS Protocols","display_name":"R0fuzz: A Collaborative Fuzzer for ICS Protocols","publication_year":2021,"publication_date":"2021-07-06","ids":{"openalex":"https://openalex.org/W3208265074","doi":"https://doi.org/10.1109/icccnt51525.2021.9579879","mag":"3208265074"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt51525.2021.9579879","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579879","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047718760","display_name":"Ashwathi Sasi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ashwathi Sasi","raw_affiliation_strings":["Department Of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"Department Of Computer Science and Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029559812","display_name":"K. Hariprasad","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hariprasad K V","raw_affiliation_strings":["Department Of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"Department Of Computer Science and Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031633920","display_name":"Season Cherian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Season Cherian","raw_affiliation_strings":["Department Of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"Department Of Computer Science and Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112650156","display_name":"Ayushi Sharma","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ayushi Sharma","raw_affiliation_strings":["Department Of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"Department Of Computer Science and Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023588434","display_name":"Jayasree Narayanan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jayasree Narayanan","raw_affiliation_strings":["Department Of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"Department Of Computer Science and Engineering","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061843011","display_name":"Vipin Pavithran","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vipin Pavithran","raw_affiliation_strings":["Amrita Center for Cybersecurity Systems and Networks, Amritapuri, India"],"affiliations":[{"raw_affiliation_string":"Amrita Center for Cybersecurity Systems and Networks, Amritapuri, India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5047718760"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2747,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.55469505,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9935827851295471},{"id":"https://openalex.org/keywords/modbus","display_name":"Modbus","score":0.9544787406921387},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.8125344514846802},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6469598412513733},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5576173663139343},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.43050459027290344},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4246114194393158},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.36954858899116516},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.33904287219047546},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.17450284957885742},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15273115038871765},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10362377762794495},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08099669218063354}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9935827851295471},{"id":"https://openalex.org/C2776666747","wikidata":"https://www.wikidata.org/wiki/Q1135322","display_name":"Modbus","level":3,"score":0.9544787406921387},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.8125344514846802},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6469598412513733},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5576173663139343},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.43050459027290344},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4246114194393158},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.36954858899116516},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33904287219047546},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.17450284957885742},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15273115038871765},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10362377762794495},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08099669218063354},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt51525.2021.9579879","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579879","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1620265354","https://openalex.org/W1793953003","https://openalex.org/W1911778649","https://openalex.org/W2039427951","https://openalex.org/W2141175718","https://openalex.org/W2277011331","https://openalex.org/W2560874070","https://openalex.org/W2784110154","https://openalex.org/W2792480350","https://openalex.org/W3009315908","https://openalex.org/W3047947484","https://openalex.org/W3091889505","https://openalex.org/W3093820454","https://openalex.org/W4234170634","https://openalex.org/W4285719527","https://openalex.org/W6681015208","https://openalex.org/W6694666077"],"related_works":["https://openalex.org/W4297097635","https://openalex.org/W3208265074","https://openalex.org/W2387904164","https://openalex.org/W4294975711","https://openalex.org/W2347722378","https://openalex.org/W2380130075","https://openalex.org/W2377307634","https://openalex.org/W2358085404","https://openalex.org/W2360168159","https://openalex.org/W144112039"],"abstract_inverted_index":{"Industries":[0],"hold":[1],"a":[2,6,50,72],"major":[3],"role":[4],"in":[5,16,66],"country's":[7],"economy":[8],"and":[9,64,80,96],"Industrial":[10],"control":[11,55],"systems":[12,26,36,56],"automate":[13],"various":[14,61,77],"processes":[15],"the":[17,67,81],"industry.":[18],"So":[19],"it":[20],"is":[21,41],"important":[22],"to":[23,88],"secure":[24],"these":[25,35,85],"properly":[27],"as":[28],"unexpected":[29],"behaviour":[30],"or":[31],"malicious":[32],"attacks":[33],"on":[34],"can":[37,48,58],"be":[38],"fatal.":[39],"Fuzzing":[40],"an":[42],"automated":[43],"security":[44],"testing":[45,51],"method":[46],"that":[47,57,75],"provide":[49],"environment":[52],"for":[53],"industrial":[54,92],"help":[59],"uncover":[60],"implementation":[62],"flaws":[63],"vulnerabilities":[65],"system.":[68],"This":[69],"paper":[70],"introduces":[71],"collaborative":[73],"fuzzer":[74],"includes":[76],"fuzzing":[78],"methodologies":[79],"described":[82],"tool":[83],"incorporates":[84],"varying":[86],"techniques":[87],"fuzz":[89],"commonly":[90],"used":[91],"protocols":[93],"like":[94],"MODBUS/TCP":[95],"DNP3.":[97]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
