{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:23Z","timestamp":1740099143490,"version":"3.37.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030004699"},{"type":"electronic","value":"9783030004705"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00470-5_25","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T10:43:19Z","timestamp":1536230599000},"page":"535-555","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Malicious IoT Implants: Tampering with Serial Communication over the Internet"],"prefix":"10.1007","author":[{"given":"Philipp","family":"Morgner","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Pfennig","sequence":"additional","affiliation":[]},{"given":"Dennis","family":"Salzner","sequence":"additional","affiliation":[]},{"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","unstructured":"Adelantado, F., Vilajosana, X., Tuset-Peir\u00f3, P., Mart\u00ednez, B., Meli\u00e0-Segu\u00ed, J., Watteyne, T.: Understanding the limits of LoRaWAN. IEEE Commun. Mag. 55(9) (2017). https:\/\/doi.org\/10.1109\/MCOM.2017.1600613","DOI":"10.1109\/MCOM.2017.1600613"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: IEEE Symposium on Security and Privacy. S&P 2007 (2007)","DOI":"10.1109\/SP.2007.36"},{"key":"25_CR3","unstructured":"Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX Security Symposium. USENIX Security 2017 (2017)"},{"key":"25_CR4","unstructured":"Appelbaum, J., Horchert, J., St\u00f6cker, C.: Shopping for spy gear: catalog advertises NSA toolbox. Spieg. Online Int. 29 (2013). http:\/\/www.spiegel.de\/international\/world\/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-40349-1_12","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"GT Becker","year":"2013","unstructured":"Becker, G.T., Regazzoni, F., Paar, C., Burleson, W.P.: Stealthy dopant-level hardware trojans. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 197\u2013214. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40349-1_12"},{"key":"25_CR6","unstructured":"Boyens, J., Paulsen, C., Moorthy, R., Bartol, N., Shankles, S.A.: Supply chain risk management practices for federal information systems and organizations. In: NIST SP, vol. 800, no. 161 (2015). https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-161.pdf"},{"key":"25_CR7","unstructured":"Datko, J., Reed, T.: NSA Playset: DIY hardware implant over I2C. In: DEF CON 22 (2014)"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Fern, N., San, I., Ko\u00e7, \u00c7.K., Cheng, K.: Hardware trojans in incompletely specified on-chip bus systems. In: Design, Automation & Test in Europe Conference & Exhibition (2016)","DOI":"10.3850\/9783981537079_0302"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: IEEE Symposium on Security and Privacy. S&P 2016 (2016)","DOI":"10.1109\/SP.2016.44"},{"key":"25_CR10","unstructured":"FitzPatrick, J.: The Tao of hardware, the Te of implants. Black Hat, USA (2016)"},{"key":"25_CR11","unstructured":"Gartner: Gartner says 8.4 billion connected \u201cthings\u201d will be in use in 2017, up 31 percent from 2016, February 2017. http:\/\/www.gartner.com\/newsroom\/id\/3598917"},{"key":"25_CR12","series-title":"AISC","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-319-27146-0_12","volume-title":"Robot 2015: Second Iberian Robotics Conference","author":"F Gomez-Bravo","year":"2016","unstructured":"Gomez-Bravo, F., Jim\u00e9nez Naharro, R., Medina Garc\u00eda, J., G\u00f3mez Gal\u00e1n, J., Raya, M.S.: Hardware attacks on mobile robots: I2C clock attacking. In: Reis, L., Moreira, A., Lima, P., Montano, L., Mu\u00f1oz-Martinez, V. (eds.) Robot 2015: Second Iberian Robotics Conference. AISC, vol. 417, pp. 147\u2013159. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-27146-0_12"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Hicks, M., Finnicum, M., King, S.T., Martin, M.M.K., Smith, J.M.: Overcoming an untrusted computing base: detecting and removing malicious hardware automatically. In: IEEE Symposium on Security and Privacy. S&P 2010 (2010)","DOI":"10.1109\/SP.2010.18"},{"key":"25_CR14","unstructured":"HopeRF Electronic: RFM95\/96\/97\/98(W) - low power long range transceiver module V1.0 datasheet. http:\/\/www.hoperf.com\/upload\/rf\/RFM95_96_97_98W.pdf"},{"key":"25_CR15","unstructured":"Hunt, G., Letey, G., Nightingale, E.: The seven properties of highly secure devices. Technical report, March 2017"},{"key":"25_CR16","unstructured":"IC Insights: NXP acquires Freescale, becomes top MCU supplier in 2016, April 2017"},{"key":"25_CR17","unstructured":"Kerlink: Kerlink continues global expansion with subsidiary in India for rollout of world\u2019s largest LoRaWAN IoT network, September 2017"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., Zhou, Y.: Designing and implementing malicious hardware. In: USENIX Workshop on Large-Scale Exploits and Emergent Threats. LEET 2008 (2008)","DOI":"10.1145\/1346281.2181012"},{"key":"25_CR19","unstructured":"Kleber, S., N\u00f6lscher, H.F., Kargl, F.: Automated PCB reverse engineering. In: 11th USENIX Workshop on Offensive Technologies. WOOT 2017 (2017)"},{"issue":"7","key":"25_CR20","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.M.: DDoS in the IoT: Mirai and other botnets. IEEE Comput. 50(7), 80\u201384 (2017). https:\/\/doi.org\/10.1109\/MC.2017.201","journal-title":"IEEE Comput."},{"key":"25_CR21","unstructured":"Kooijman, M.: Arduino LoraMAC-in-C (LMiC) library. https:\/\/github.com\/matthijskooijman\/arduino-lmic"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Kumar, R., Jovanovic, P., Burleson, W.P., Polian, I.: Parametric trojans for fault-injection attacks on cryptographic hardware. In: Workshop on Fault Diagnosis and Tolerance in Cryptography. FDTC 2014 (2014)","DOI":"10.1109\/FDTC.2014.12"},{"issue":"2","key":"25_CR23","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.sysarc.2010.12.001","volume":"57","author":"J L\u00e1zaro","year":"2011","unstructured":"L\u00e1zaro, J., Astarloa, A., Zuloaga, A., Bidarte, U., Jimenez, J.: I2CSec: a secure serial chip-to-chip communication protocol. J. Syst. Arch.-Embed. Syst. Des. 57(2), 206\u2013213 (2011). https:\/\/doi.org\/10.1016\/j.sysarc.2010.12.001","journal-title":"J. Syst. Arch.-Embed. Syst. Des."},{"key":"25_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-642-04138-9_27","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"L Lin","year":"2009","unstructured":"Lin, L., Kasper, M., G\u00fcneysu, T., Paar, C., Burleson, W.: Trojan side-channels: lightweight hardware trojans through side-channel engineering. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 382\u2013395. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04138-9_27"},{"key":"25_CR25","unstructured":"LoRa Alliance: LoRa Alliance surpasses 500 member mark and drives strong LoRaWAN protocol deployments, June 2017"},{"key":"25_CR26","unstructured":"LoRa Alliance: LoRaWAN global networks - where are we today? October 2017"},{"key":"25_CR27","unstructured":"Machina Research: With 3 billion connections, LPWA will dominate wide area wireless connectivity for M2M by 2023, February 2015"},{"issue":"4","key":"25_CR28","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSP.2015.80","volume":"13","author":"J Margulies","year":"2015","unstructured":"Margulies, J.: Garage door openers: an internet of things case study. IEEE Secur. Priv. 13(4), 80\u201383 (2015). https:\/\/doi.org\/10.1109\/MSP.2015.80","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"25_CR29","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/S0360-8352(02)00066-9","volume":"43","author":"H Min","year":"2002","unstructured":"Min, H., Zhou, G.: Supply chain modeling: past, present and future. Comput. Ind. Eng. 43(1), 231\u2013249 (2002). https:\/\/doi.org\/10.1016\/S0360-8352(02)00066-9","journal-title":"Comput. Ind. Eng."},{"key":"25_CR30","doi-asserted-by":"crossref","unstructured":"Morgner, P., Mattejat, S., Benenson, Z., M\u00fcller, C., Armknecht, F.: Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning. In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks. WiSec 2017 (2017)","DOI":"10.1145\/3098243.3098254"},{"key":"25_CR31","unstructured":"NXP: The I2C-bus specification and user manual - UM10204, April 2014"},{"key":"25_CR32","unstructured":"Reichert, C.: NNN Co and Actility announce LoRaWAN network rollout across Australia, February 2017"},{"key":"25_CR33","doi-asserted-by":"crossref","unstructured":"Ronen, E., O\u2019Flynn, C., Shamir, A., Weingarten, A.: IoT goes nuclear: creating a ZigBee chain reaction. In: IEEE Symposium on Security and Privacy. S&P 2017 (2017)","DOI":"10.1109\/SP.2017.14"},{"key":"25_CR34","doi-asserted-by":"crossref","unstructured":"Rostami, M., Koushanfar, F., Rajendran, J., Karri, R.: Hardware security: threat models and metrics. In: The IEEE\/ACM International Conference on Computer-Aided Design (2013)","DOI":"10.1109\/ICCAD.2013.6691207"},{"key":"25_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/11787952","volume-title":"Digital Rights Management: Technologies, Issues, Challenges and Systems","author":"R Safavi-Naini","year":"2006","unstructured":"Safavi-Naini, R.: Digital Rights Management: Technologies, Issues, Challenges and Systems, vol. 3919. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787952"},{"key":"25_CR36","doi-asserted-by":"crossref","unstructured":"Shiyanovskii, Y., Wolff, F.G., Rajendran, A., Papachristou, C.A., Weyer, D.J., Clay, W.: Process reliability based trojans through NBTI and HCI effects. In: 2010 NASA\/ESA Conference on Adaptive Hardware and Systems. AHS 2010 (2010)","DOI":"10.1109\/AHS.2010.5546257"},{"key":"25_CR37","unstructured":"Shwartz, O., Cohen, A., Shabtai, A., Oren, Y.: Shattered trust: when replacement smartphone components attack. In: 11th USENIX Workshop on Offensive Technologies. WOOT 2017 (2017)"},{"key":"25_CR38","unstructured":"Sigfox: SIGFOX expanding IoT network in 100 U.S. cities, February 2017"},{"key":"25_CR39","unstructured":"STMicroelectronics: STM32F303CB datasheet, May 2016"},{"key":"25_CR40","unstructured":"STMicroelectronics: STM32Cube initialization code generator datasheet, July 2017"},{"key":"25_CR41","doi-asserted-by":"crossref","unstructured":"Sturton, C., Hicks, M., Wagner, D.A., King, S.T.: Defeating UCI: building stealthy and malicious hardware. In: IEEE Symposium on Security and Privacy. S&P 2011 (2011)","DOI":"10.1109\/SP.2011.32"},{"key":"25_CR42","doi-asserted-by":"crossref","unstructured":"Yang, K., Hicks, M., Dong, Q., Austin, T.M., Sylvester, D.: A2: analog malicious hardware. In: IEEE Symposium on Security and Privacy. S&P 2016 (2016)","DOI":"10.1109\/SP.2016.10"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00470-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T22:34:32Z","timestamp":1693866872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00470-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030004699","9783030004705"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00470-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}