“…Compromising any one of these components or PLCs can potentially allow an attacker to manipulate the system into a damaging physical state. This has motivated a huge variety of research into defending and assessing CPSs, spanning techniques based on anomaly detection [7,12,17,22,28,32,39,40,44,45,47,49,51,54,57,60,65,66], fingerprinting [13,35,43,50,79], invariant-based monitoring [8,9,11,20,24,25,29,73,81], trusted execution environments [70], and fuzzing [26,27,78].…”