{"id":"https://openalex.org/W4415398334","doi":"https://doi.org/10.1109/smartgridcomm65349.2025.11204572","title":"AutoPGT: LLM-Driven Automated Policy Generation for Securing Industrial Control Systems","display_name":"AutoPGT: LLM-Driven Automated Policy Generation for Securing Industrial Control Systems","publication_year":2025,"publication_date":"2025-09-29","ids":{"openalex":"https://openalex.org/W4415398334","doi":"https://doi.org/10.1109/smartgridcomm65349.2025.11204572"},"language":null,"primary_location":{"id":"doi:10.1109/smartgridcomm65349.2025.11204572","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm65349.2025.11204572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051647494","display_name":"Rochelle Xenia Mendoza Santos","orcid":"https://orcid.org/0009-0002-9337-7802"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rochelle Xenia Mendoza Santos","raw_affiliation_strings":["Illinois Advanced Research Center at Singapore,Singapore"],"affiliations":[{"raw_affiliation_string":"Illinois Advanced Research Center at Singapore,Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023606873","display_name":"Ertem Esiner","orcid":"https://orcid.org/0000-0002-3290-2514"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ertem Esiner","raw_affiliation_strings":["Illinois Advanced Research Center at Singapore,Singapore"],"affiliations":[{"raw_affiliation_string":"Illinois Advanced Research Center at Singapore,Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004001325","display_name":"Utku Tefek","orcid":"https://orcid.org/0000-0002-4436-9200"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Utku Tefek","raw_affiliation_strings":["Illinois Advanced Research Center at Singapore,Singapore"],"affiliations":[{"raw_affiliation_string":"Illinois Advanced Research Center at Singapore,Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038897777","display_name":"Matthew Caesar","orcid":"https://orcid.org/0000-0001-5955-9229"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew Caesar","raw_affiliation_strings":["University of Illinois Urbana-Champaign,USA"],"affiliations":[{"raw_affiliation_string":"University of Illinois Urbana-Champaign,USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049285151","display_name":"Daisuke Mashima","orcid":"https://orcid.org/0000-0003-1946-1790"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Daisuke Mashima","raw_affiliation_strings":["Singapore University of Technology and Design,Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design,Singapore","institution_ids":["https://openalex.org/I152815399"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5051647494"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40636452,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9556000232696533,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interconnectivity","display_name":"Interconnectivity","score":0.7621999979019165},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5874000191688538},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5828999876976013},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4424999952316284},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.4390999972820282},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4278999865055084},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.36340001225471497},{"id":"https://openalex.org/keywords/xacml","display_name":"XACML","score":0.3603000044822693}],"concepts":[{"id":"https://openalex.org/C25516864","wikidata":"https://www.wikidata.org/wiki/Q1665949","display_name":"Interconnectivity","level":2,"score":0.7621999979019165},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6571999788284302},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5874000191688538},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5828999876976013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.478300005197525},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4424999952316284},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.4390999972820282},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4352000057697296},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4278999865055084},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.36340001225471497},{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.3603000044822693},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.335999995470047},{"id":"https://openalex.org/C123587114","wikidata":"https://www.wikidata.org/wiki/Q2101508","display_name":"Policy analysis","level":2,"score":0.32749998569488525},{"id":"https://openalex.org/C2776187449","wikidata":"https://www.wikidata.org/wiki/Q1513879","display_name":"Natural language generation","level":3,"score":0.3246000111103058},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.29919999837875366},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.29490000009536743},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.2930999994277954},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.2754000127315521},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.27489998936653137},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.2736000120639801},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.27239999175071716},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.2703000009059906},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.2614000141620636},{"id":"https://openalex.org/C2778348673","wikidata":"https://www.wikidata.org/wiki/Q739302","display_name":"Production (economics)","level":2,"score":0.25600001215934753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartgridcomm65349.2025.11204572","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm65349.2025.11204572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Industrial":[0],"Control":[1],"Systems":[2],"(ICSs)":[3],"face":[4],"growing":[5],"exposure":[6],"to":[7,10,28,87,104,140],"cyberattacks":[8],"due":[9],"increasing":[11],"interconnectivity":[12],"and":[13,41,47,77,97,120,136,150,162],"continued":[14],"digitization.":[15],"Effective":[16],"protection":[17],"from":[18,94],"these":[19,56,154],"threats":[20],"requires":[21],"well-designed":[22],"security":[23,36,69,164],"policies":[24,119,149,165],"that":[25,67,132,166],"are":[26],"adapted":[27],"the":[29,48,114,121,138,158,168],"target":[30],"system\u2019s":[31],"unique":[32],"operating":[33],"environment.":[34],"However,":[35],"policy":[37,70,92,107],"development":[38,159],"remains":[39],"manual":[40],"error-prone,":[42],"constrained":[43],"by":[44,112],"system":[45,78,102],"complexity":[46],"need":[49],"for":[50],"specialized":[51],"technical":[52],"expertise.":[53],"To":[54],"address":[55],"limitations,":[57],"this":[58],"paper":[59],"presents":[60],"AutoPGT,":[61],"an":[62],"Automated":[63],"Policy":[64],"Generation":[65],"Tool":[66],"produces":[68],"code":[71],"based":[72],"on":[73],"natural":[74],"language":[75],"descriptions":[76],"data.":[79],"The":[80],"tool":[81],"uses":[82],"Large":[83],"Language":[84],"Models":[85],"(LLMs)":[86],"first":[88],"generate":[89],"reusable":[90],"system-agnostic":[91],"templates":[93],"user":[95,123,151],"descriptions,":[96],"then":[98],"combines":[99],"them":[100],"with":[101],"data":[103],"produce":[105],"system-specific":[106],"code.":[108],"We":[109],"evaluate":[110],"AutoPGT":[111,156],"gauging":[113],"alignment":[115,146],"between":[116,147],"its":[117,142],"drafted":[118],"original":[122],"intent":[124],"under":[125],"different":[126],"generation":[127],"configurations.":[128],"Our":[129],"results":[130],"show":[131],"including":[133],"representative":[134],"examples":[135],"requiring":[137],"model":[139],"justify":[141],"choices":[143],"yields":[144],"stronger":[145],"generated":[148],"intent.":[152],"Given":[153],"findings,":[155],"enables":[157],"of":[160,170],"intuitive":[161],"robust":[163],"strengthen":[167],"resilience":[169],"critical":[171],"cyber-physical":[172],"systems.":[173]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-22T00:00:00"}
