{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T13:02:50Z","timestamp":1760014970491,"version":"3.44.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/pst47121.2019.8949023","type":"proceedings-article","created":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T23:06:06Z","timestamp":1578438366000},"page":"1-11","source":"Crossref","is-referenced-by-count":15,"title":["Onboarding and Software Update Architecture for IoT Devices"],"prefix":"10.1109","author":[{"given":"Hemant","family":"Gupta","sequence":"first","affiliation":[{"name":"School of Computer Science, Carleton University,Ottawa,Canada"}]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carleton University,Ottawa,Canada"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8392"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8235"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8236"},{"journal-title":"DRAFT NIST Special Publication 800&#x2013;63B Digital Identity Guidelines","year":"2017","author":"grassi","key":"ref30"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.07.008"},{"key":"ref34","article-title":"The resurrecting duckling: Security issues for ad-hoc wireless networks","author":"stajano","year":"1999","journal-title":"Security Protocols Workshop"},{"key":"ref10","article-title":"Out of the loop: How automated software updates cause unintended security consequences","author":"wash","year":"2014","journal-title":"Proceedings of the 10th Symposium on Usable Privacy and Security"},{"key":"ref11","article-title":"A Firmware Update Architecture for Internet of Things Devices","author":"moran","year":"2019","journal-title":"Internet-Draft draft-moran-suit-architecture-02 IETF"},{"key":"ref12","article-title":"Firmware Updates for Internet of Things Devices - An Information Model for Manifests","author":"moran","year":"2019","journal-title":"Internet-Draft draft-ietf-suit-information-model-02 IETF"},{"key":"ref13","article-title":"A Secure and Automatic Firmware Update Architecture for IoT Devices","author":"zhu","year":"2018","journal-title":"Internet-Draft draft-zhu-suit-automatic-fu-arch-OO IETF"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.202"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2505901"},{"journal-title":"Performance of state-of-the-art cryptography on ARM-based microprocessors","year":"2015","author":"tschofenig","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139940"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2017.8280149"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8032"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2016.7448561"},{"journal-title":"Californial Legislative Information","article-title":"Sb-327 information privacy: connected devices","year":"2018","key":"ref4"},{"key":"ref27","article-title":"Bootstrapping Remote Secure Key Infrastructures (BRSKI)","author":"pritikin","year":"2019","journal-title":"Internet-Draft draft-ietf-anima-bootstrapping-keyinfra-18 IETF"},{"key":"ref3","article-title":"When firmware modifications attack: A case study of embedded exploitation","author":"cui","year":"2013","journal-title":"NDSS"},{"key":"ref6","article-title":"Self-signed executables: Restricting replacement of program binaries by malware","author":"wurster","year":"2007","journal-title":"HOTSEC"},{"journal-title":"Handbook of Applied Cryptography","year":"1996","author":"menezes","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7228"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8240"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.7"},{"journal-title":"How the NSA's firmware hacking works and why it's so unsettling","year":"2015","author":"zetter","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813665"},{"key":"ref1","article-title":"Understanding the Mirai botnet","author":"antonakakis","year":"2017","journal-title":"USENIX Security Symposium"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7748"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8017"},{"key":"ref24","first-page":"207","article-title":"Curve25519: New Diffie-Hellman Speed Records","author":"bernstein","year":"2006","journal-title":"PKC"},{"journal-title":"Standards for Efficient Cryptography SEC 1 Elliptic Curve Cryptography","year":"2009","author":"brown","key":"ref23"},{"key":"ref26","article-title":"Baton: Certificate agility for android's decentralized signing infrastructure","author":"barrera","year":"2014","journal-title":"ACM WiSec"},{"journal-title":"UM0586 User manual STM32 Cryptographic Library","year":"0","key":"ref25"}],"event":{"name":"2019 17th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2019,8,26]]},"location":"Fredericton, NB, Canada","end":{"date-parts":[[2019,8,28]]}},"container-title":["2019 17th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8937293\/8949011\/08949023.pdf?arnumber=8949023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T19:20:39Z","timestamp":1756754439000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8949023\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/pst47121.2019.8949023","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}