{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T10:46:17Z","timestamp":1768905977651,"version":"3.49.0"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031820649","type":"print"},{"value":"9783031820656","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82065-6_7","type":"book-chapter","created":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T17:02:03Z","timestamp":1735405323000},"page":"87-103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Threats to\u00a0the\u00a0IoT Device Production Processes \u2013 A Blind Spot in\u00a0the\u00a0Product Security Lifecycle"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7046-7698","authenticated-orcid":false,"given":"Philipp","family":"Schubaur","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9849-876X","authenticated-orcid":false,"given":"Peter","family":"Knauer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2310-5895","authenticated-orcid":false,"given":"Dominik","family":"Merli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,29]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Abiona, O.O., Oladapo, O.J., Modupe, O.T., Oyeniran, O.C., Adewusi, A.O., Komolafe, A.M.: The emergence and importance of DevSecOps: integrating and reviewing security practices within the DevOps pipeline. World J. Adv. Eng. Technol. Sci. 11(2), 127\u2013133 (2024). https:\/\/doi.org\/10.30574\/wjaets.2024.11.2.0093","DOI":"10.30574\/wjaets.2024.11.2.0093"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"77543","DOI":"10.1109\/access.2023.3288696","volume":"11","author":"S Akter","year":"2023","unstructured":"Akter, S., Khalil, K., Bayoumi, M.: A survey on hardware security: current trends and challenges. IEEE Access 11, 77543\u201377565 (2023). https:\/\/doi.org\/10.1109\/access.2023.3288696","journal-title":"IEEE Access"},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Al\u00a0Barazanchi, I.I., Hashim, W., Thabit, R., Sekhar, R., Shah, P., Penubadi, H.R.: Secure trust node acquisition and access control for privacy-preserving expertise trust in WBAN networks, pp. 265\u2013275. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-62881-8_22","DOI":"10.1007\/978-3-031-62881-8_22"},{"issue":"11","key":"7_CR4","doi-asserted-by":"publisher","first-page":"5206","DOI":"10.3390\/s23115206","volume":"23","author":"MEE Alahi","year":"2023","unstructured":"Alahi, M.E.E., et al.: Integration of IoT-enabled technologies and artificial intelligence (AI) for smart city scenario: recent advancements and future trends. Sensors 23(11), 5206 (2023). https:\/\/doi.org\/10.3390\/s23115206","journal-title":"Sensors"},{"issue":"3","key":"7_CR5","doi-asserted-by":"publisher","first-page":"817","DOI":"10.3390\/s18030817","volume":"18","author":"B Ali","year":"2018","unstructured":"Ali, B., Awad, A.I.: Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18(3), 817 (2018). https:\/\/doi.org\/10.3390\/s18030817","journal-title":"Sensors"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Boeckl, K., et al.: Considerations for managing internet of things (IoT) cybersecurity and privacy risks. US Department of Commerce, National Institute of Standards and Technology (2019). https:\/\/doi.org\/10.6028\/nist.ir.8228","DOI":"10.6028\/nist.ir.8228"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compind.2018.04.015","volume":"101","author":"H Boyes","year":"2018","unstructured":"Boyes, H., Hallaq, B., Cunningham, J., Watson, T.: The industrial internet of things (IIoT): an analysis framework. Comput. Ind. 101, 1\u201312 (2018). https:\/\/doi.org\/10.1016\/j.compind.2018.04.015","journal-title":"Comput. Ind."},{"key":"7_CR8","unstructured":"Car, P., De\u00a0Luca, S.: EU Cyber Resilience Act. EPRS, European Parliament (2022). https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/cyber-resilience-act"},{"issue":"2","key":"7_CR9","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1080\/13600869.2022.2060468","volume":"36","author":"PG Chiara","year":"2022","unstructured":"Chiara, P.G.: The IoT and the new EU cybersecurity regulatory landscape. Int. Rev. Law Comput. Technol. 36(2), 118\u2013137 (2022). https:\/\/doi.org\/10.1080\/13600869.2022.2060468","journal-title":"Int. Rev. Law Comput. Technol."},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Davis, K.R., Peabody, B., Leach, P.: Universally Unique IDentifiers (UUIDs). No.\u00a09562 in Request for Comments, RFC Editor (2024). https:\/\/doi.org\/10.17487\/rfc9562. https:\/\/www.rfc-editor.org\/info\/rfc9562","DOI":"10.17487\/rfc9562"},{"key":"7_CR11","doi-asserted-by":"publisher","unstructured":"Dodson, D., et al.: Securing small business and home internet of things (IoT) devices: mitigating network-based attacks using manufacturer usage description (MUD). National Institute of Standards and Technology (2021). https:\/\/doi.org\/10.6028\/nist.sp.1800-15","DOI":"10.6028\/nist.sp.1800-15"},{"key":"7_CR12","doi-asserted-by":"publisher","unstructured":"Everett, C.: Ransomware: to pay or not to pay? Comput. Fraud Secur. 2016(4), 8\u201312 (2016). https:\/\/doi.org\/10.1016\/s1361-3723(16)30036-7. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1361372316300367","DOI":"10.1016\/s1361-3723(16)30036-7"},{"key":"7_CR13","doi-asserted-by":"publisher","unstructured":"Finney, H., Donnerhacke, L., Callas, J., Thayer, R.L., Shaw, D.: OpenPGP Message Format. RFC 4880 (2007). https:\/\/doi.org\/10.17487\/RFC4880. https:\/\/www.rfc-editor.org\/info\/rfc4880","DOI":"10.17487\/RFC4880"},{"key":"7_CR14","unstructured":"Force, J.T.: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy (Discussion Draft). Technical report, National Institute of Standards and Technology (2018). https:\/\/csrc.nist.gov\/pubs\/sp\/800\/37\/r2\/final"},{"key":"7_CR15","doi-asserted-by":"publisher","unstructured":"Gokarna, M., Singh, R.: DevOps: a historical review and future works. In: 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), pp. 366\u2013371. IEEE (2021). https:\/\/doi.org\/10.1109\/icccis51004.2021.9397235","DOI":"10.1109\/icccis51004.2021.9397235"},{"key":"7_CR16","unstructured":"Hacquebord, F., Hilt, S., Sancho, D.: The Near And Far Future Of Ransomware Business Models. Trend Micro Research (2022). https:\/\/www.key4biz.it\/wp-content\/uploads\/2022\/12\/wp-the-near-and-far-future-of-ransomware.pdf"},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-62707-2_1","volume-title":"Hardware Supply Chain Security","author":"B Halak","year":"2021","unstructured":"Halak, B.: CIST: a threat modelling approach for hardware supply chain security. In: Halak, B. (ed.) Hardware Supply Chain Security, pp. 3\u201365. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-62707-2_1"},{"key":"7_CR18","unstructured":"ISO Central Secretary: Cybersecurity \u2013 IoT security and privacy \u2013 Guidelines. Standard ISO\/IEC 27400:2022(E), International Organization for Standardization, Geneva, CH (2022). https:\/\/www.iso.org\/standard\/80136.html"},{"key":"7_CR19","unstructured":"ISO Central Secretary: Cybersecurity \u2013 IoT security and privacy \u2013 Device baseline requirements. Standard ISO\/IEC 27402:2023(E), International Organization for Standardization, Geneva, CH (2023). https:\/\/www.iso.org\/standard\/80136.html"},{"issue":"1","key":"7_CR20","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1016\/j.aej.2020.11.003","volume":"60","author":"M Khalifa","year":"2021","unstructured":"Khalifa, M., Algarni, F., Ayoub Khan, M., Ullah, A., Aloufi, K.: A lightweight cryptography (LWC) framework to secure memory heap in Internet of Things. Alex. Eng. J. 60(1), 1489\u20131497 (2021). https:\/\/doi.org\/10.1016\/j.aej.2020.11.003","journal-title":"Alex. Eng. J."},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.future.2017.10.045","volume":"82","author":"G Manogaran","year":"2018","unstructured":"Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P.M., Sundarasekar, R., Thota, C.: A new architecture of internet of things and big data ecosystem for secured smart healthcare monitoring and alerting system. Futur. Gener. Comput. Syst. 82, 375\u2013387 (2018). https:\/\/doi.org\/10.1016\/j.future.2017.10.045","journal-title":"Futur. Gener. Comput. Syst."},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Mayoral-Vilches, V., Garc\u00eda-Maestro, N., Towers, M., Gil-Uriarte, E.: DevSecOps in Robotics (2020). https:\/\/doi.org\/10.48550\/ARXIV.2003.10402","DOI":"10.48550\/ARXIV.2003.10402"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"McKnight, M.: IoT, industry 4.0, industrial Iot...why connected devices are the future of design. KnE Eng. 2(2), 197 (2017). https:\/\/doi.org\/10.18502\/keg.v2i2.615","DOI":"10.18502\/keg.v2i2.615"},{"key":"7_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2021.110969","volume":"144","author":"GH Merabet","year":"2021","unstructured":"Merabet, G.H., et al.: Intelligent building control systems for thermal comfort and energy-efficiency: a systematic review of artificial intelligence-assisted techniques. Renew. Sustain. Energy Rev. 144, 110969 (2021). https:\/\/doi.org\/10.1016\/j.rser.2021.110969","journal-title":"Renew. Sustain. Energy Rev."},{"key":"7_CR25","unstructured":"MITRE: MITRE ATT &CK Framework (2015). https:\/\/attack.mitre.org. Accessed 05 Sept 2024"},{"key":"7_CR26","doi-asserted-by":"publisher","unstructured":"Nzeako, G., Okeke, C.D., Akinsanya, M.O., Popoola, O.A., Chukwurah, E.G.: Security paradigms for IoT in telecom networks: conceptual challenges and solution pathways. Eng. Sci. Technol. J. 5(5), 1606\u20131626 (2024). https:\/\/doi.org\/10.51594\/estj.v5i5.1111","DOI":"10.51594\/estj.v5i5.1111"},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Parihar, V., Malik, A., Bhawna, Bhushan, B., Chaganti, R.: From smart devices to smarter systems: the evolution of artificial intelligence of things (AIoT) with characteristics, architecture, use cases and challenges, pp. 1\u201328. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-31952-5_1","DOI":"10.1007\/978-3-031-31952-5_1"},{"issue":"1","key":"7_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/8421434","volume":"2022","author":"AA Pise","year":"2022","unstructured":"Pise, A.A., et al.: Enabling artificial intelligence of things (AIoT) healthcare architectures and listing security issues. Comput. Intell. Neurosci. 2022(1), 1\u201314 (2022). https:\/\/doi.org\/10.1155\/2022\/8421434","journal-title":"Comput. Intell. Neurosci."},{"key":"7_CR29","unstructured":"Skouloudi, C., Malatras, A., Naydenov, R., Dede, G.: Guidelines for Securing the Internet of Things. Technical report, European Union Agency for Cybersecurity (ENISA) (2020). https:\/\/www.enisa.europa.eu\/publications\/guidelines-for-securing-the-internet-of-things"},{"key":"7_CR30","doi-asserted-by":"publisher","unstructured":"Sleem, A., Elhenawy, I.: Survey of artificial intelligence of things for smart buildings: a closer outlook. J. Intell. Syst. Internet Things 8(2), 63\u201371 (2023). https:\/\/doi.org\/10.54216\/jisiot.080206","DOI":"10.54216\/jisiot.080206"},{"key":"7_CR31","doi-asserted-by":"publisher","unstructured":"Soares, E., Sizilio, G., Santos, J., da\u00a0Costa, D.A., Kulesza, U.: The effects of continuous integration on software development: a systematic literature review. Empirical Softw. Eng. 27(3) (2022). https:\/\/doi.org\/10.1007\/s10664-021-10114-1","DOI":"10.1007\/s10664-021-10114-1"},{"key":"7_CR32","doi-asserted-by":"publisher","unstructured":"Stahl, D., Martensson, T., Bosch, J.: Continuous practices and devops: beyond the buzz, what does it all mean? In: 2017 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA). IEEE (2017). https:\/\/doi.org\/10.1109\/seaa.2017.8114695","DOI":"10.1109\/seaa.2017.8114695"},{"key":"7_CR33","doi-asserted-by":"publisher","unstructured":"Tatineni, S.: Compliance and audit challenges in DevOps: a security perspective. Int. Res. J. Mod. Eng. Technol. Sci. 5(10), 1306\u20131316 (2023). https:\/\/doi.org\/10.56726\/IRJMETS45309","DOI":"10.56726\/IRJMETS45309"},{"key":"7_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102779","volume":"171","author":"N Yousefnezhad","year":"2020","unstructured":"Yousefnezhad, N., Malhi, A., Fr\u00e4mling, K.: Security in product lifecycle of IoT devices: a survey. J. Netw. Comput. Appl. 171, 102779 (2020). https:\/\/doi.org\/10.1016\/j.jnca.2020.102779","journal-title":"J. Netw. Comput. Appl."},{"issue":"6","key":"7_CR35","doi-asserted-by":"publisher","DOI":"10.1002\/hsr2.863","volume":"5","author":"S Zakerabasali","year":"2022","unstructured":"Zakerabasali, S., Ayyoubzadeh, S.M.: Internet of things and healthcare system: a systematic review of ethical issues. Health Sci. Rep. 5(6), e863 (2022). https:\/\/doi.org\/10.1002\/hsr2.863","journal-title":"Health Sci. Rep."},{"issue":"10","key":"7_CR36","doi-asserted-by":"publisher","first-page":"7789","DOI":"10.1109\/jiot.2020.3039359","volume":"8","author":"J Zhang","year":"2021","unstructured":"Zhang, J., Tao, D.: Empowering things with intelligence: a survey of the progress, challenges, and opportunities in artificial intelligence of things. IEEE Internet Things J. 8(10), 7789\u20137817 (2021). https:\/\/doi.org\/10.1109\/jiot.2020.3039359","journal-title":"IEEE Internet Things J."}],"container-title":["IFIP Advances in Information and Communication Technology","Internet of Things. 7th IFIPIoT 2024 International IFIP WG 5.5 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82065-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T17:02:37Z","timestamp":1735405357000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82065-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,29]]},"ISBN":["9783031820649","9783031820656"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82065-6_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,29]]},"assertion":[{"value":"29 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IFIPIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Internet of Things Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nice","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ifipiot2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifip-iotconference.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}