{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:24:16Z","timestamp":1743114256514,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030527938"},{"type":"electronic","value":"9783030527945"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52794-5_14","type":"book-chapter","created":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T23:11:31Z","timestamp":1594249891000},"page":"185-199","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Improvements by Separating the Cryptographic Protocol from the Network Stack onto a Multi-MCU Architecture"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Frauenschl\u00e4ger","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Renner","sequence":"additional","affiliation":[]},{"given":"J\u00fcrgen","family":"Mottok","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,9]]},"reference":[{"key":"14_CR1","unstructured":"IEC 61508: Functional safety of electrical\/electronic\/programmable electronic safety-related systems. Technical report International Electrotechnical Commission, April 2010"},{"key":"14_CR2","unstructured":"IEC 62351\u20133: Power systems management and associated information exchange - data and communications security; Part 3: Communication network and system security - Profiles including TCP\/IP. Technical report International Electrotechnical Commission, October 2014"},{"key":"14_CR3","unstructured":"International Organization for Standardization: Identification cards - Integrated circuit cards - Part 3: Cards with contacts - Electrical interface and transmission protocols. Standard ISO\/IEC, 7816\u20133 (2006)"},{"key":"14_CR4","unstructured":"International Organization for Standardization: Information technology - Security techniques - Evaluation criteria for IT security. Standard ISO\/IEC 15408\u20131\/2\/3:2009, December 2009"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Irmak, E., Erkek, I.: An overview of cyber-attack vectors on SCADA systems. In: 2018 6th International Symposium on Digital Forensic and Security, ISDFS, pp. 1\u20135, March 2018. \nhttps:\/\/doi.org\/10.1109\/ISDFS.2018.8355379","DOI":"10.1109\/ISDFS.2018.8355379"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"79523","DOI":"10.1109\/ACCESS.2019.2920763","volume":"7","author":"X Liu","year":"2019","unstructured":"Liu, X., Qian, C., Hatcher, W.G., Xu, H., Liao, W., Yu, W.: Secure Internet of Things (IoT)-based smart-world critical infrastructures: survey, case study and research opportunities. IEEE Access 7, 79523\u201379544 (2019). \nhttps:\/\/doi.org\/10.1109\/ACCESS.2019.2920763","journal-title":"IEEE Access"},{"key":"14_CR7","doi-asserted-by":"publisher","unstructured":"Mukhtar, M.A., Bhatti, M.K., Gogniat, G.: Architectures for security: a comparative analysis of hardware security features in Intel SGX and ARM TrustZone. In: 2019 2nd International Conference on Communication, Computing and Digital systems (C-CODE), pp. 299\u2013304, March 2019. \nhttps:\/\/doi.org\/10.1109\/C-CODE.2019.8680982","DOI":"10.1109\/C-CODE.2019.8680982"},{"key":"14_CR8","doi-asserted-by":"publisher","unstructured":"Niedermaier, M., Merli, D., Sigl, G.: A secure Dual-MCU architecture for robust communication of IIoT devices. In: 2019 8th Mediterranean Conference on Embedded Computing, MECO, pp. 1\u20135, June 2019. \nhttps:\/\/doi.org\/10.1109\/MECO.2019.8760188","DOI":"10.1109\/MECO.2019.8760188"},{"key":"14_CR9","unstructured":"Schindler, W., Killmann, W.: A proposal for: Functionality classes for random number generators. Bundesamt f\u00fcr Sicherheit in der Informationstechnik, September 2011"},{"key":"14_CR10","unstructured":"Frauenschl\u00e4ger, T., Dentgen, M., Mottok, J.: Systemarchitektur eines Sicherheitsmoduls im Energiesektor. In: 2. Symposium Elektronik und Systemintegration: Intelligente Systeme und ihre Komponenten: Forschung und industrielle Anwendung, April 2020. \nhttps:\/\/www.haw-landshut.de\/fileadmin\/Hochschule_Landshut_NEU\/Ungeschuetzt\/ITZ_Cluster_Forschung\/ClusterMST\/Symposium-ESI\/2020\/Tagungsbandbeitraege\/A1-3_OTH-Regensburg_Frauenschlaeger_ESI_2020.pdf"},{"key":"14_CR11","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-47063-4_1","volume-title":"Internet of Things. IoT Infrastructures","author":"P Urien","year":"2016","unstructured":"Urien, P.: Innovative TLS\/DTLS security modules for iot applications: concepts and experiments. In: Mandler, B., Marquez-Barja, J., Mitre Campista, M.E., Cag\u00e1\u0148ov\u00e1, D., Chaouchi, H., Zeadally, S., Badra, M., Giordano, S., Fazio, M., Somov, A., Vieriu, R.-L. (eds.) IoT360 2015. LNICST, vol. 169, pp. 3\u201315. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-47063-4_1"}],"container-title":["Lecture Notes in Computer Science","Architecture of Computing Systems \u2013 ARCS 2020"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52794-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T00:06:24Z","timestamp":1594253184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52794-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030527938","9783030527945"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52794-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Architecture of Computing Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Aachen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 May 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 May 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"arcs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/arcs2020.itec.kit.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was canceled due to the COVID-19 pandemic. 6 workshop papers are also included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}