1. Ali Abbasi and Majid Hashemi. 2016. Ghost in the PLC Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack. In Black Hat Europe. 1--35. Ali Abbasi and Majid Hashemi. 2016. Ghost in the PLC Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack. In Black Hat Europe. 1--35.
2. ICS Advisory . 2020. Emerson OpenEnterprise . https://www.cisa.gov/uscert/ics/advisories/icsa-20-238-02. (2020). [Online ; Accessed October 2022 ]. ICS Advisory. 2020. Emerson OpenEnterprise. https://www.cisa.gov/uscert/ics/advisories/icsa-20-238-02. (2020). [Online; Accessed October 2022].
3. ICS Advisory . 2020. Siemens SIMATIC HMI Products. https://us-cert.cisa.gov/ics/advisories/icsa-20-252-06. (2020). [Online ; Accessed October 2022 ]. ICS Advisory. 2020. Siemens SIMATIC HMI Products. https://us-cert.cisa.gov/ics/advisories/icsa-20-252-06. (2020). [Online; Accessed October 2022].
4. ICS Advisory . 2021. SIMATIC WinCC Graphics Designer. https://us-cert.cisa.gov/ics/advisories/icsa-21-040-09. (2021). [Online ; Accessed October 2022 ]. ICS Advisory. 2021. SIMATIC WinCC Graphics Designer. https://us-cert.cisa.gov/ics/advisories/icsa-21-040-09. (2021). [Online; Accessed October 2022].
5. Siemens AG. 2017. Programming with STEP 7. https://cache.industry.siemens.com/dl/files/825/109751825/att_933142/v1/STEP_7_-_Programming_with_STEP_7.pdf. (2017). [Online ; Accessed October 2022 ]. Siemens AG. 2017. Programming with STEP 7. https://cache.industry.siemens.com/dl/files/825/109751825/att_933142/v1/STEP_7_-_Programming_with_STEP_7.pdf. (2017). [Online; Accessed October 2022].