{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:25:18Z","timestamp":1769912718945,"version":"3.49.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2018YFB0803402"],"award-info":[{"award-number":["2018YFB0803402"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972024"],"award-info":[{"award-number":["61972024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&amp;D Program of China","award":["2020YFB2103802"],"award-info":[{"award-number":["2020YFB2103802"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/tdsc.2021.3119970","type":"journal-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T10:01:22Z","timestamp":1634292082000},"page":"4099-4112","source":"Crossref","is-referenced-by-count":12,"title":["Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9833-2836","authenticated-orcid":false,"given":"Qiang","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1400-8129","authenticated-orcid":false,"given":"Dawei","family":"Tan","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7190-2453","authenticated-orcid":false,"given":"Xin","family":"Ge","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9665-7511","authenticated-orcid":false,"given":"Haining","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7071-2976","authenticated-orcid":false,"given":"Zhi","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences (CAS), Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1147-4327","authenticated-orcid":false,"given":"Jiqiang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978315"},{"key":"ref33","first-page":"211","article-title":"An improved clock-skew measurement technique for revealing hidden services","author":"zander","year":"2008","journal-title":"Proc 17th Conf Secur Symp"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.013"},{"key":"ref30","first-page":"1","article-title":"When firmware modifications attack: A case study of embedded exploitation","volume":"1","author":"cui","year":"2013","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref37","first-page":"1041","article-title":"Vulnerability disclosure in the age of social media: Exploiting twitter for predicting real-world exploits","author":"sabottke","year":"2015","journal-title":"Proc 24th USENIX Secur Symp"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3393691.3394220"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134072"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980921"},{"key":"ref10","year":"0"},{"key":"ref11","article-title":"Embedded devices security and firmware reverse engineering","author":"zaddach","year":"2013","journal-title":"Proc Black Hat USA"},{"key":"ref12","first-page":"41","article-title":"QEMU, a fast and portable dynamic translator","author":"bellard","year":"2005","journal-title":"Proc Annu Conf USENIX Annu Tech Conf"},{"key":"ref13","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013"},{"key":"ref14","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref15","year":"0"},{"key":"ref16","year":"0"},{"key":"ref17","year":"0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486326"},{"key":"ref27","first-page":"95","article-title":"A large-scale analysis of the security of embedded firmwares","author":"costin","year":"2014","journal-title":"Proc 23th USENIX Secur Symp"},{"key":"ref3","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"ref5","first-page":"430","article-title":"DTaint: Detecting the taint-style vulnerability in embedded device firmware","author":"kai","year":"2018","journal-title":"Proc 48th Annu IEEE\/IFIP Int Conf Dependable Syst Netw"},{"key":"ref8","year":"0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"},{"key":"ref2","article-title":"Computer security resouce center for official common platform enumeration dictionary","year":"0"},{"key":"ref1","first-page":"1092","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"Proc Usenix Secur Symp"},{"key":"ref9","year":"0"},{"key":"ref20","year":"1997"},{"key":"ref22","first-page":"327","article-title":"Acquisitional rule-based engine for discovering internet-of-things devices","author":"feng","year":"2018","journal-title":"Proc 27th USENIX Secur Symp"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"ref24","first-page":"605","article-title":"ZMap: Fast Internet-wide scanning and its security applications","author":"durumeric","year":"2013","journal-title":"Proc 22th USENIX Secur Symp"},{"key":"ref23","article-title":"The search engine for Internet-connected devices","year":"0"},{"key":"ref26","article-title":"A library for learning of word embeddings and text classification","year":"2016"},{"key":"ref25","year":"0"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9945627\/09573428.pdf?arnumber=9573428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:24:10Z","timestamp":1670873050000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9573428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":38,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2021.3119970","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,1]]}}}