{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:07:25Z","timestamp":1766732845977,"version":"3.44.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/wf-iot.2016.7845410","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:42:54Z","timestamp":1486658574000},"page":"307-310","source":"Crossref","is-referenced-by-count":17,"title":["Recommendations for securing Internet of Things devices using commodity hardware"],"prefix":"10.1109","author":[{"given":"Steven J.","family":"Johnston","sequence":"first","affiliation":[{"name":"Faculty of Engineering and the Environment, University of Southampton, United Kingdom"}]},{"given":"Mark","family":"Scott","sequence":"additional","affiliation":[{"name":"Faculty of Engineering and the Environment, University of Southampton, United Kingdom"}]},{"given":"Simon J.","family":"Cox","sequence":"additional","affiliation":[{"name":"Faculty of Engineering and the Environment, University of Southampton, United Kingdom"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29804-2_12"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516714"},{"journal-title":"TCG PC Client Specific Implementation Specification for Conventional BIOS Version 1 21 Errata","year":"2012","key":"ref12"},{"journal-title":"Intel Trusted Execution Technology Software Development Guide","year":"2014","key":"ref13"},{"journal-title":"AMD64 Architecture Programmer's Manual Volume 2 System Programming","year":"2011","key":"ref14"},{"journal-title":"ARM Security Technology Building A Secure System Using TrustZone Technology","year":"2009","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2666141.2666145"},{"journal-title":"RSA 2013 - Trusted Computing Billions of Secure Endpoints in 10 Years","article-title":"Trusted computing in Nokia Lumia","year":"2013","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516758"},{"journal-title":"Internet of Things potential risk of crime and how to prevent it","year":"2014","author":"watson","key":"ref19"},{"journal-title":"Information technology - trusted platform module","year":"2009","key":"ref4"},{"key":"ref3","article-title":"Hardware backdooring is practical","author":"brossard","year":"2012","journal-title":"Blackhat Briefings and Defcon conferences"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"journal-title":"TPM Main Specification Level 2 Version 1 2 Revision 116 Part 1 Design Principles","year":"2011","key":"ref5"},{"key":"ref8","article-title":"A security assessment of trusted platform modules","author":"sparks","year":"2007","journal-title":"Tech Rep TR2007-597"},{"journal-title":"Secure Hash Standard (SHS)","year":"2012","key":"ref7"},{"journal-title":"Metcalfe's Law - A network becomes more valuable as it reaches more users","year":"1995","author":"metcalfe","key":"ref2"},{"journal-title":"Forecast The internet of things worldwide","year":"2013","author":"middleton","key":"ref1"},{"key":"ref9","article-title":"OSLO: Improving the security of trusted computing","volume":"7","author":"kauer","year":"2007","journal-title":"Usenix Security"}],"event":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2016,12,12]]},"location":"Reston, VA, USA","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7831562\/7845389\/07845410.pdf?arnumber=7845410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:43:29Z","timestamp":1755197009000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7845410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2016.7845410","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}