{"id":"https://openalex.org/W3134227994","doi":"https://doi.org/10.1145/3531063","title":"Yoneda Hacking: The Algebra of Attacker Actions","display_name":"Yoneda Hacking: The Algebra of Attacker Actions","publication_year":2022,"publication_date":"2022-05-05","ids":{"openalex":"https://openalex.org/W3134227994","doi":"https://doi.org/10.1145/3531063","mag":"3134227994"},"language":"en","primary_location":{"id":"doi:10.1145/3531063","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3531063","pdf_url":null,"source":{"id":"https://openalex.org/S2506189754","display_name":"ACM Transactions on Cyber-Physical Systems","issn_l":"2378-962X","issn":["2378-962X","2378-9638"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Cyber-Physical Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080758702","display_name":"Georgios Bakirtzis","orcid":"https://orcid.org/0000-0003-4992-0193"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Georgios Bakirtzis","raw_affiliation_strings":["The University of Texas at Austin, USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Austin, USA","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081773021","display_name":"Fabrizio Genovese","orcid":"https://orcid.org/0000-0001-7792-1375"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"education","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Fabrizio Genovese","raw_affiliation_strings":["University of Pisa, Pisa PI, Italy"],"affiliations":[{"raw_affiliation_string":"University of Pisa, Pisa PI, Italy","institution_ids":["https://openalex.org/I108290504"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113457201","display_name":"Cody Fleming","orcid":null},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cody H. Fleming","raw_affiliation_strings":["Iowa State University, USA"],"affiliations":[{"raw_affiliation_string":"Iowa State University, USA","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5080758702"],"corresponding_institution_ids":["https://openalex.org/I86519309"],"apc_list":null,"apc_paid":null,"fwci":0.6065,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.69856228,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"6","issue":"3","first_page":"1","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9117199182510376},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6489624977111816},{"id":"https://openalex.org/keywords/formalism","display_name":"Formalism (music)","score":0.6452181339263916},{"id":"https://openalex.org/keywords/rewriting","display_name":"Rewriting","score":0.5881643891334534},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5585673451423645},{"id":"https://openalex.org/keywords/lemma","display_name":"Lemma (botany)","score":0.4916020333766937},{"id":"https://openalex.org/keywords/categorical-variable","display_name":"Categorical variable","score":0.44991374015808105},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4447237253189087},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.42579153180122375},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.17438551783561707},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.1163855791091919}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9117199182510376},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6489624977111816},{"id":"https://openalex.org/C73301696","wikidata":"https://www.wikidata.org/wiki/Q5469984","display_name":"Formalism (music)","level":3,"score":0.6452181339263916},{"id":"https://openalex.org/C154690210","wikidata":"https://www.wikidata.org/wiki/Q1668499","display_name":"Rewriting","level":2,"score":0.5881643891334534},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5585673451423645},{"id":"https://openalex.org/C2777759810","wikidata":"https://www.wikidata.org/wiki/Q149316","display_name":"Lemma (botany)","level":3,"score":0.4916020333766937},{"id":"https://openalex.org/C5274069","wikidata":"https://www.wikidata.org/wiki/Q2285707","display_name":"Categorical variable","level":2,"score":0.44991374015808105},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4447237253189087},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.42579153180122375},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17438551783561707},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.1163855791091919},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C558565934","wikidata":"https://www.wikidata.org/wiki/Q2743","display_name":"Musical","level":2,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C46757340","wikidata":"https://www.wikidata.org/wiki/Q43238","display_name":"Poaceae","level":2,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3531063","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3531063","pdf_url":null,"source":{"id":"https://openalex.org/S2506189754","display_name":"ACM Transactions on Cyber-Physical Systems","issn_l":"2378-962X","issn":["2378-962X","2378-9638"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Cyber-Physical Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":81,"referenced_works":["https://openalex.org/W207267598","https://openalex.org/W651462859","https://openalex.org/W1571102086","https://openalex.org/W1585089195","https://openalex.org/W1597908183","https://openalex.org/W1992837486","https://openalex.org/W1994801532","https://openalex.org/W1995810576","https://openalex.org/W1999420484","https://openalex.org/W2022595765","https://openalex.org/W2040004825","https://openalex.org/W2056743217","https://openalex.org/W2115973579","https://openalex.org/W2118630710","https://openalex.org/W2121805588","https://openalex.org/W2145071552","https://openalex.org/W2159443917","https://openalex.org/W2171087000","https://openalex.org/W2495607404","https://openalex.org/W2601064133","https://openalex.org/W2617246254","https://openalex.org/W2679033717","https://openalex.org/W2790819674","https://openalex.org/W2798427558","https://openalex.org/W2803609894","https://openalex.org/W2884227110","https://openalex.org/W2886790899","https://openalex.org/W2915922814","https://openalex.org/W2926991544","https://openalex.org/W2943271740","https://openalex.org/W2945624265","https://openalex.org/W2951450966","https://openalex.org/W2962877316","https://openalex.org/W2962887654","https://openalex.org/W2963051982","https://openalex.org/W2963619589","https://openalex.org/W2972034313","https://openalex.org/W2972163906","https://openalex.org/W2972672530","https://openalex.org/W2986720777","https://openalex.org/W2995187155","https://openalex.org/W2998447709","https://openalex.org/W3011364142","https://openalex.org/W3011451315","https://openalex.org/W3011908035","https://openalex.org/W3020881623","https://openalex.org/W3020915645","https://openalex.org/W3021844877","https://openalex.org/W3022973524","https://openalex.org/W3029114445","https://openalex.org/W3030119148","https://openalex.org/W3032694069","https://openalex.org/W3036060098","https://openalex.org/W3036793517","https://openalex.org/W3037759832","https://openalex.org/W3045584024","https://openalex.org/W3047653534","https://openalex.org/W3084611726","https://openalex.org/W3086503924","https://openalex.org/W3091226474","https://openalex.org/W3092961706","https://openalex.org/W3100557837","https://openalex.org/W3102032454","https://openalex.org/W3105235044","https://openalex.org/W3107977833","https://openalex.org/W3108251226","https://openalex.org/W3108526986","https://openalex.org/W3121646244","https://openalex.org/W3134657433","https://openalex.org/W3140824938","https://openalex.org/W3141842699","https://openalex.org/W3177651511","https://openalex.org/W3200407034","https://openalex.org/W3215034481","https://openalex.org/W4206586902","https://openalex.org/W4210262431","https://openalex.org/W4233669187","https://openalex.org/W6621547180","https://openalex.org/W6764331401","https://openalex.org/W6772326478","https://openalex.org/W6779688093"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W1982580243","https://openalex.org/W2183730421","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W2120204135","https://openalex.org/W4286284259","https://openalex.org/W1507118973"],"abstract_inverted_index":{"Our":[0],"work":[1],"focuses":[2],"on":[3],"modeling":[4,170],"the":[5,26,40,52,66,69,80,91,100,104,113,121,129],"security":[6,36],"of":[7,143,187],"systems":[8],"from":[9],"their":[10],"component-level":[11],"designs.":[12],"Towards":[13],"this":[14,50,160,169],"goal,":[15],"we":[16,43,98],"develop":[17],"a":[18,125,135,163,190,199],"categorical":[19,27],"formalism":[20,28],"to":[21,103,124],"model":[22,45,99,184],"attacker":[23,46],"actions.":[24],"Equipping":[25],"with":[29,94],"algebras":[30],"produces":[31],"two":[32,59,185],"interesting":[33],"results":[34],"for":[35],"modeling.":[37],"First,":[38],"using":[39,144,172],"Yoneda":[41,53],"lemma,":[42],"can":[44,87,151],"reconnaissance":[47],"missions.":[48],"In":[49],"context,":[51],"lemma":[54],"shows":[55],"us":[56],"that":[57,85,148],"if":[58],"system":[60,92,105,116,138,179],"representations,":[61],"one":[62],"being":[63,68],"complete":[64],"and":[65,183,197],"other":[67],"attacker\u2019s":[70],"incomplete":[71,95],"view,":[72],"agree":[73],"at":[74],"every":[75],"possible":[76],"test,":[77],"they":[78],"behave":[79],"same.":[81],"The":[82],"implication":[83],"is":[84,147],"attackers":[86],"still":[88],"successfully":[89],"exploit":[90,110],"even":[93],"information.":[96],"Second,":[97],"potential":[101],"changes":[102,128],"via":[106],"an":[107,173],"exploit.":[108],"An":[109],"either":[111],"manipulate":[112],"interactions":[114],"between":[115],"components,":[117],"such":[118,132],"as":[119,133,154],"providing":[120],"wrong":[122],"values":[123],"sensor,":[126],"or":[127],"components":[130],"themselves,":[131],"controlling":[134],"global":[136],"positioning":[137],"(GPS).":[139],"One":[140],"additional":[141],"benefit":[142],"category":[145],"theory":[146],"mathematical":[149],"operations":[150],"be":[152],"represented":[153],"formal":[155],"diagrams,":[156],"helpful":[157],"in":[158,162],"applying":[159],"analysis":[161],"model-based":[164],"design":[165],"setting.":[166],"We":[167,181],"illustrate":[168],"framework":[171],"unmanned":[174],"aerial":[175],"vehicle":[176],"(UAV)":[177],"cyber-physical":[178],"model.":[180],"demonstrate":[182],"types":[186],"attacks":[188],"(1)":[189],"rewiring":[191],"attack,":[192,201],"which":[193,202],"violates":[194,203],"data":[195],"integrity,":[196],"(2)":[198],"rewriting":[200],"availability.":[204]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
