{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:43:47Z","timestamp":1743151427604,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031175091"},{"type":"electronic","value":"9783031175107"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17510-7_22","type":"book-chapter","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T04:03:06Z","timestamp":1665547386000},"page":"324-334","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Viruses, Exploits, Malware and Security Issues on IoT Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9316-7739","authenticated-orcid":false,"given":"Cristian","family":"Toma","sequence":"first","affiliation":[]},{"given":"C\u0103t\u0103lin","family":"Boja","sequence":"additional","affiliation":[]},{"given":"Marius","family":"Popa","sequence":"additional","affiliation":[]},{"given":"Mihai","family":"Doinea","sequence":"additional","affiliation":[]},{"given":"Cristian","family":"Ciurea","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,13]]},"reference":[{"key":"22_CR1","unstructured":"Kleymenov, A., Thabet, A.: Mastering Malware Analysis: The Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks. Packt Publishing, Birmingham (2019), ISBN-13: 978-1789610789, ISBN-10: 1789610788"},{"key":"22_CR2","unstructured":"GitHub Resources for the paper and ARM Assembly published by authors. https:\/\/github.com\/critoma\/armasmiot\/tree\/master\/labs\/workspacearmassembly\/arm32. Accessed 11 Nov 2021"},{"key":"22_CR3","unstructured":"Azeria Labs Exploits for ARM \u2013 Shellcode and Reverse Shellcode. https:\/\/azeria-labs.com\/writing-arm-shellcode\/, https:\/\/azeria-labs.com\/tcp-bind-shell-in-assembly-arm-32-bit\/, https:\/\/azeria-labs.com\/tcp-reverse-shell-in-assembly-arm-32-bit\/. Accessed 11 Nov 2021"},{"key":"22_CR4","unstructured":"Eurosmart IoT Study Report - Internet of Trust S.A.S. (IOTR) \u2013 T\u00dcV Informationstechnik GmbH (T\u00dcViT), A Cartography of Security Certification Schemes\/Standards for IOT. https:\/\/www.eurosmart.com\/wp-content\/uploads\/2020\/02\/2020-01-27-Eurosmart_IoT_Study_Report-v1.2.pdf. Accessed 11 Nov 2021"},{"key":"22_CR5","unstructured":"Resources for BSZ. https:\/\/www.bsi.bund.de\/EN\/Topics\/Certification\/product_certification\/Accelerated_Security_Certification\/Accelerated-Security-Certification_node.html. Accessed 11 Nov 2021"},{"key":"22_CR6","unstructured":"Resources for CSPN. https:\/\/www.ssi.gouv.fr\/administration\/produits-certifies\/cspn\/. Accessed 11 Nov 2021"},{"key":"22_CR7","unstructured":"Resources for e-IoT-SCS. https:\/\/www.eurosmart.com\/eurosmart-iot-certification-scheme\/. Accessed 11 Nov 2021"},{"key":"22_CR8","unstructured":"Resources for ETSI TS 103 645. https:\/\/www.etsi.org\/deliver\/etsi_ts\/103600_103699\/103645\/01.01.01_60\/ts_103645v010101p.pdf, https:\/\/www.etsi.org\/deliver\/etsi_en\/303600_303699\/303645\/02.01.01_60\/en_303645v020101p.pdf. Accessed 11 Nov 2021"},{"key":"22_CR9","unstructured":"Resources for GP TEE. https:\/\/globalplatform.org\/certifications\/security-certification\/, https:\/\/globalplatform.org\/wp-content\/uploads\/2021\/01\/GP_TEECertificationProcess_v2.0_PublicRelease.pdf. Accessed 11 Nov 2021"},{"key":"22_CR10","unstructured":"Resources for GP SE. https:\/\/globalplatform.org\/certifications\/security-certification\/, https:\/\/globalplatform.org\/wp-content\/uploads\/2021\/02\/GP_SE_CertificationProcess_v2.0_PublicRelease.pdf. Accessed 11 Nov 2021"},{"key":"22_CR11","unstructured":"Resources for GSMA IoT SA. https:\/\/www.gsma.com\/iot\/iot-security-assessment\/, https:\/\/www.gsma.com\/iot\/wp-content\/uploads\/2020\/05\/CLP.11-v2.2-GSMA-IoT-Security-Guidelines-Overview-Document.pdf, https:\/\/www.gsma.com\/iot\/wp-content\/uploads\/2020\/05\/GSMA-IoT-Security-Assessment.zip. Accessed 11 Nov 2021"},{"key":"22_CR12","unstructured":"Resources for IoTSCF. https:\/\/www.iotsecurityfoundation.org\/wp-content\/uploads\/2021\/11\/IoTSF-IoT-Security-Assurance-Framework-Release-3.0-Nov-2021-1.pdf. Accessed 11 Nov 2021"},{"key":"22_CR13","unstructured":"Resources for IEC 62443. www.iecee.org for IECEE CB schemes. https:\/\/iq.ulprospector.com\/info\/ for UL schemes. https:\/\/isasecure.org\/en-US\/ for ISA Secure schemes. Accessed 11 Nov 2021"},{"key":"22_CR14","unstructured":"Resources for PSA Level 1. https:\/\/www.psacertified.org\/, https:\/\/www.psacertified.org\/app\/uploads\/2019\/02\/PSA_Certified_Level_1_Step-by-Step_Guide_v1.5.pdf. Accessed 11 Nov 2021"},{"key":"22_CR15","unstructured":"Resources for PSA Level 2. https:\/\/www.psacertified.org\/, https:\/\/www.psacertified.org\/app\/uploads\/2020\/07\/JSADEN011-PSA_Certified_Level_2_Step-by-Step-1.1-20200403.pdf. Accessed 11 Nov 2021"},{"key":"22_CR16","unstructured":"Resources for SESIP. https:\/\/globalplatform.org\/wp-content\/uploads\/2020\/03\/GP_SESIP_v1.0_PublicRelease.pdf. Accessed 11 Nov 2021"},{"key":"22_CR17","unstructured":"Resources for SOG-IS. https:\/\/www.sogis.eu\/, https:\/\/www.commoncriteriaportal.org\/cc\/. Accessed 11 Nov 2021"},{"key":"22_CR18","unstructured":"Resources for UL IoT Security Rating. https:\/\/ims.ul.com\/iot-security-rating, https:\/\/www.shopulstandards.com\/ProductDetail.aspx?UniqueKey=35953, https:\/\/verify.ul.com. Accessed 11 Nov 2021"},{"key":"22_CR19","unstructured":"Resources for UL 2900. https:\/\/www.ul.com\/offerings\/cybersecurity-assurance-and-compliance, https:\/\/www.shopulstandards.com\/Catalog.aspx, https:\/\/iq.ulprospector.com\/info\/. Accessed 11 Nov 2021"},{"key":"22_CR20","unstructured":"Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., Henry, J.: IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things, Cisco Press, Indianapolis (2017). ISBN-10: 1-58714-456-5, ISBN-13: 978-1-58714-456-1"},{"key":"22_CR21","unstructured":"Opensource CalmAV Antivirus for Embedded Linux OS. https:\/\/www.clamav.net\/downloads, https:\/\/github.com\/Cisco-Talos\/clamav"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17510-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T12:05:26Z","timestamp":1671797126000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17510-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031175091","9783031175107"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17510-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"13 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}