{"id":"https://openalex.org/W2791587036","doi":"https://doi.org/10.1145/3176258.3176319","title":"Denial of Engineering Operations Attacks in Industrial Control Systems","display_name":"Denial of Engineering Operations Attacks in Industrial Control Systems","publication_year":2018,"publication_date":"2018-03-13","ids":{"openalex":"https://openalex.org/W2791587036","doi":"https://doi.org/10.1145/3176258.3176319","mag":"2791587036"},"language":"en","primary_location":{"id":"doi:10.1145/3176258.3176319","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3176258.3176319","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012334362","display_name":"Saranyan Senthivel","orcid":null},"institutions":[{"id":"https://openalex.org/I192396691","display_name":"University of New Orleans","ror":"https://ror.org/034mtvk83","country_code":"US","type":"education","lineage":["https://openalex.org/I192396691","https://openalex.org/I2799628689"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Saranyan Senthivel","raw_affiliation_strings":["University of New Orleans, New Orleans, LA, USA"],"affiliations":[{"raw_affiliation_string":"University of New Orleans, New Orleans, LA, USA","institution_ids":["https://openalex.org/I192396691"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064028017","display_name":"Shrey Dhungana","orcid":null},"institutions":[{"id":"https://openalex.org/I192396691","display_name":"University of New Orleans","ror":"https://ror.org/034mtvk83","country_code":"US","type":"education","lineage":["https://openalex.org/I192396691","https://openalex.org/I2799628689"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shrey Dhungana","raw_affiliation_strings":["University of New Orleans, New Orleans, LA, USA"],"affiliations":[{"raw_affiliation_string":"University of New Orleans, New Orleans, LA, USA","institution_ids":["https://openalex.org/I192396691"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019996334","display_name":"Hyunguk Yoo","orcid":null},"institutions":[{"id":"https://openalex.org/I192396691","display_name":"University of New Orleans","ror":"https://ror.org/034mtvk83","country_code":"US","type":"education","lineage":["https://openalex.org/I192396691","https://openalex.org/I2799628689"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hyunguk Yoo","raw_affiliation_strings":["University of New Orleans, New Orleans, LA, USA"],"affiliations":[{"raw_affiliation_string":"University of New Orleans, New Orleans, LA, USA","institution_ids":["https://openalex.org/I192396691"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063509441","display_name":"Irfan Ahmed","orcid":"https://orcid.org/0000-0001-5648-388X"},"institutions":[{"id":"https://openalex.org/I192396691","display_name":"University of New Orleans","ror":"https://ror.org/034mtvk83","country_code":"US","type":"education","lineage":["https://openalex.org/I192396691","https://openalex.org/I2799628689"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Irfan Ahmed","raw_affiliation_strings":["University of New Orleans, New Orleans, LA, USA"],"affiliations":[{"raw_affiliation_string":"University of New Orleans, New Orleans, LA, USA","institution_ids":["https://openalex.org/I192396691"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019922169","display_name":"Vassil Roussev","orcid":null},"institutions":[{"id":"https://openalex.org/I192396691","display_name":"University of New Orleans","ror":"https://ror.org/034mtvk83","country_code":"US","type":"education","lineage":["https://openalex.org/I192396691","https://openalex.org/I2799628689"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vassil Roussev","raw_affiliation_strings":["University of New Orleans, New Orleans, LA, USA"],"affiliations":[{"raw_affiliation_string":"University of New Orleans, New Orleans, LA, USA","institution_ids":["https://openalex.org/I192396691"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5012334362"],"corresponding_institution_ids":["https://openalex.org/I192396691"],"apc_list":null,"apc_paid":null,"fwci":3.3029,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.9315123,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"319","last_page":"329"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/programmable-logic-controller","display_name":"Programmable logic controller","score":0.8398355841636658},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6431800127029419},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5819419622421265},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5724354386329651},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5511625409126282},{"id":"https://openalex.org/keywords/ladder-logic","display_name":"Ladder logic","score":0.5368481278419495},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5254147052764893},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4449462890625},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.43532803654670715},{"id":"https://openalex.org/keywords/control-logic","display_name":"Control logic","score":0.431686669588089},{"id":"https://openalex.org/keywords/denial","display_name":"Denial","score":0.41989022493362427},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.41446229815483093},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3324517607688904},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3242751359939575},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13992658257484436},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11119979619979858},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11070245504379272},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09015607833862305}],"concepts":[{"id":"https://openalex.org/C37374048","wikidata":"https://www.wikidata.org/wiki/Q188674","display_name":"Programmable logic controller","level":2,"score":0.8398355841636658},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6431800127029419},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5819419622421265},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5724354386329651},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5511625409126282},{"id":"https://openalex.org/C44986683","wikidata":"https://www.wikidata.org/wiki/Q1411875","display_name":"Ladder logic","level":3,"score":0.5368481278419495},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5254147052764893},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4449462890625},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.43532803654670715},{"id":"https://openalex.org/C2776350369","wikidata":"https://www.wikidata.org/wiki/Q843479","display_name":"Control logic","level":2,"score":0.431686669588089},{"id":"https://openalex.org/C2780900520","wikidata":"https://www.wikidata.org/wiki/Q100268981","display_name":"Denial","level":2,"score":0.41989022493362427},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.41446229815483093},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3324517607688904},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3242751359939575},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13992658257484436},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11119979619979858},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11070245504379272},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09015607833862305},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3176258.3176319","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3176258.3176319","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W38537450","https://openalex.org/W1674877186","https://openalex.org/W1974853427","https://openalex.org/W2039427951","https://openalex.org/W2040161058","https://openalex.org/W2072777295","https://openalex.org/W2142993476","https://openalex.org/W2241428156","https://openalex.org/W2570433379","https://openalex.org/W2613978545","https://openalex.org/W2742236820","https://openalex.org/W2768270002","https://openalex.org/W2953078836","https://openalex.org/W4256305391"],"related_works":["https://openalex.org/W2120722979","https://openalex.org/W2183772682","https://openalex.org/W2106496413","https://openalex.org/W2394472197","https://openalex.org/W1527893442","https://openalex.org/W3203500078","https://openalex.org/W4206484832","https://openalex.org/W99842341","https://openalex.org/W2594635183","https://openalex.org/W2615384553"],"abstract_inverted_index":{"We":[0],"present":[1],"a":[2,28,50],"new":[3],"type":[4],"of":[5,9,22,30],"attack":[6,81],"termed":[7],"denial":[8],"engineering":[10,24,39],"operations":[11],"in":[12],"which":[13],"an":[14,23],"attacker":[15,35],"can":[16,36,83],"interfere":[17],"with":[18],"the":[19,34,38,45,57,61,65,73,88,96,101,110,116,121],"normal":[20],"cycle":[21],"operation":[25],"leading":[26],"to":[27,43,69,76,92,99],"loss":[29],"situational":[31],"awareness.":[32],"Specifically,":[33],"deceive":[37],"software":[40,66],"during":[41],"attempts":[42],"retrieve":[44],"ladder":[46,58,125],"logic":[47,52,59,126],"program":[48],"from":[49],"programmable":[51],"controller":[53],"(PLC)":[54],"by":[55],"manipulating":[56],"on":[60],"PLC,":[62],"such":[63],"that":[64],"is":[67],"unable":[68],"process":[70],"it":[71,78],"while":[72,95],"PLC":[74],"continues":[75],"execute":[77],"successfully.":[79],"This":[80],"vector":[82],"provide":[84],"sufficient":[85],"cover":[86],"for":[87,124],"attacker\u00bbs":[89],"actual":[90],"scenario":[91],"play":[93],"out":[94],"owner":[97],"tries":[98],"understand":[100],"problem":[102],"and":[103],"reestablish":[104],"positive":[105],"operational":[106],"control.":[107],"To":[108],"enable":[109],"forensic":[111],"analysis":[112],"and,":[113],"eventually,":[114],"eliminate":[115],"threat,":[117],"we":[118],"have":[119],"developed":[120],"first":[122],"decompiler":[123],"programs.":[127]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
