Abstract: In this paper, we take the attack approach introduced in our previous work [8] one more step in the direction of exploiting PLCs offline, and extend our experiments to cover the latest and ...