{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T18:35:20Z","timestamp":1775154920293,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,7]],"date-time":"2015-06-07T00:00:00Z","timestamp":1433635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["EC SPRIDE"],"award-info":[{"award-number":["EC SPRIDE"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"name":"LOEWE Zentrum CASED","award":["CASED"],"award-info":[{"award-number":["CASED"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,7]]},"DOI":"10.1145\/2744769.2747942","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":607,"title":["Security and privacy challenges in industrial internet of things"],"prefix":"10.1145","author":[{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Germany"}]},{"given":"Christian","family":"Wachsmann","sequence":"additional","affiliation":[{"name":"Intel CRI-SC at TU Darmstadt, Germany"}]},{"given":"Michael","family":"Waidner","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Germany and Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2015,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Federation of Automatic Control","author":"From SmartFactory","year":"2008","unstructured":"SmartFactory --- From Vision to Reality in Factory Technologies . International Federation of Automatic Control , 2008 . SmartFactory --- From Vision to Reality in Factory Technologies. International Federation of Automatic Control, 2008."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.12.001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884371"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516650"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2497591"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_3_2_1_7_1","volume-title":"The myths and facts behind cyber security risks for industrial control systems. Technical report","author":"Byres E.","year":"2004","unstructured":"E. Byres and J. Lowe . The myths and facts behind cyber security risks for industrial control systems. Technical report , PA Consulting Group , 2004 . E. Byres and J. Lowe. The myths and facts behind cyber security risks for industrial control systems. Technical report, PA Consulting Group, 2004."},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Conference on Security. USENIX Association","author":"Checkoway S.","year":"2011","unstructured":"S. Checkoway , D. McCoy , B. Kantor , D. Anderson , H. Shacham , S. Savage , K. Koscher , A. Czeskis , F. Roesner , and T. Kohno . Comprehensive experimental analyses of automotive attack surfaces . In USENIX Conference on Security. USENIX Association , 2011 . S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Conference on Security. USENIX Association, 2011."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2006.12.001"},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Conference on Security Symposium. USENIX Association","author":"Costin A.","year":"2014","unstructured":"A. Costin , J. Zaddach , A. Francillon , and D. Balzarotti . A large-scale analysis of the security of embedded firmwares . In USENIX Conference on Security Symposium. USENIX Association , 2014 . A. Costin, J. Zaddach, A. Francillon, and D. Balzarotti. A large-scale analysis of the security of embedded firmwares. In USENIX Conference on Security Symposium. USENIX Association, 2014."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920276"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"key":"e_1_3_2_1_13_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Eldefrawy K.","year":"2012","unstructured":"K. Eldefrawy , A. Francillon , D. Perito , and G. Tsudik . SMART: Secure and minimal architecture for (establishing a dynamic) root of trust . In Network and Distributed System Security Symposium (NDSS) , 2012 . K. Eldefrawy, A. Francillon, D. Perito, and G. Tsudik. SMART: Secure and minimal architecture for (establishing a dynamic) root of trust. In Network and Distributed System Security Symposium (NDSS), 2012."},{"key":"e_1_3_2_1_14_1","volume-title":"Network and Distributed System Security Symposium (NDSS). Internet Society","author":"Eldefrawy K.","year":"2012","unstructured":"K. Eldefrawy , G. Tsudik , A. Francillon , and D. Perito . SMART: Secure and minimal architecture for (establishing a dynamic) root of trust . In Network and Distributed System Security Symposium (NDSS). Internet Society , 2012 . K. Eldefrawy, G. Tsudik, A. Francillon, and D. Perito. SMART: Secure and minimal architecture for (establishing a dynamic) root of trust. In Network and Distributed System Security Symposium (NDSS). Internet Society, 2012."},{"key":"e_1_3_2_1_15_1","volume-title":"Conference on Design, Automation & Test in Europe (DATE). European Design and Automation Association","author":"Francillon A.","year":"2014","unstructured":"A. Francillon , Q. Nguyen , K. B. Rasmussen , and G. Tsudik . A minimalist approach to remote attestation . In Conference on Design, Automation & Test in Europe (DATE). European Design and Automation Association , 2014 . A. Francillon, Q. Nguyen, K. B. Rasmussen, and G. Tsudik. A minimalist approach to remote attestation. In Conference on Design, Automation & Test in Europe (DATE). European Design and Automation Association, 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033231"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.162"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"e_1_3_2_1_19_1","volume-title":"BlackHat USA","author":"Hernandez G.","year":"2014","unstructured":"G. Hernandez , O. Arias , D. Buentello , and Y. Jin . Smart Nest thermostat --- A smart spy in your home . In BlackHat USA , 2014 . G. Hernandez, O. Arias, D. Buentello, and Y. Jin. Smart Nest thermostat --- A smart spy in your home. In BlackHat USA, 2014."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_3_2_1_21_1","volume-title":"BlackHat Europe","author":"Illera A. G.","year":"2014","unstructured":"A. G. Illera and J. V. Vidal . Lights off! The darkness of the smart meters . In BlackHat Europe , 2014 . A. G. Illera and J. V. Vidal. Lights off! The darkness of the smart meters. In BlackHat Europe, 2014."},{"key":"e_1_3_2_1_22_1","volume-title":"Attacks on power systems: Hackers, malware","author":"Kabay M.","year":"2010","unstructured":"M. Kabay . Attacks on power systems: Hackers, malware , 2010 . M. Kabay. Attacks on power systems: Hackers, malware, 2010."},{"key":"e_1_3_2_1_23_1","volume-title":"Securing the future of German manufacturing industry --- Recommendations for implementing the strategic initiative Industrie 4.0","author":"Kagermann H.","year":"2013","unstructured":"H. Kagermann , W. Wahlster , and J. Helbig . Securing the future of German manufacturing industry --- Recommendations for implementing the strategic initiative Industrie 4.0 , 2013 . H. Kagermann, W. Wahlster, and J. Helbig. Securing the future of German manufacturing industry --- Recommendations for implementing the strategic initiative Industrie 4.0, 2013."},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security","author":"Kennell R.","year":"2003","unstructured":"R. Kennell and L. H. Jamieson . Establishing the genuinity of remote computer systems . In USENIX Security . USENIX Association , 2003 . R. Kennell and L. H. Jamieson. Establishing the genuinity of remote computer systems. In USENIX Security. USENIX Association, 2003."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593192"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228402"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.45"},{"issue":"11","key":"e_1_3_2_1_30_1","volume":"90","author":"Kumar J. S.","year":"2014","unstructured":"J. S. Kumar and D. R. Patel . A survey on internet of things: Security and privacy issues. International Journal of Computer Applications , 90 ( 11 ), 2014 . J. S. Kumar and D. R. Patel. A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 90(11), 2014.","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253573"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2012.56"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7_38"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714634"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660334"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380790.2380805"},{"key":"e_1_3_2_1_41_1","volume-title":"BlackHat USA","author":"Miller C.","year":"2014","unstructured":"C. Miller and C. Valasek . A survey of remote automotive attack surfaces . In BlackHat USA , 2014 . C. Miller and C. Valasek. A survey of remote automotive attack surfaces. In BlackHat USA, 2014."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"e_1_3_2_1_43_1","first-page":"305","author":"Nicol D. M.","year":"2011","unstructured":"D. M. Nicol . Hacking the lights out. Scientific American , 305 , 2011 . D. M. Nicol. Hacking the lights out. Scientific American, 305, 2011.","journal-title":"Scientific American"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/047168659X.ch11"},{"key":"e_1_3_2_1_45_1","volume-title":"USENIX Conference on Security. USENIX Association","author":"Noorman J.","year":"2013","unstructured":"J. Noorman , P. Agten , W. Daniels , R. Strackx , A. Van Herrewege , C. Huygens , B. Preneel , I. Verbauwhede , and F. Piessens . Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base . In USENIX Conference on Security. USENIX Association , 2013 . J. Noorman, P. Agten, W. Daniels, R. Strackx, A. Van Herrewege, C. Huygens, B. Preneel, I. Verbauwhede, and F. Piessens. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In USENIX Conference on Security. USENIX Association, 2013."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516678"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5699-1_90"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.32"},{"key":"e_1_3_2_1_49_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"Petroni N. L.","year":"2004","unstructured":"N. L. Petroni , Jr., T. Fraser , J. Molina , and W. A. Arbaugh . Copilot --- A coprocessor-based kernel runtime integrity monitor . In USENIX Security Symposium. USENIX Association , 2004 . N. L. Petroni, Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot --- A coprocessor-based kernel runtime integrity monitor. In USENIX Security Symposium. USENIX Association, 2004."},{"key":"e_1_3_2_1_50_1","volume-title":"BlackHat USA","author":"Pollet J.","year":"2010","unstructured":"J. Pollet and J. Cummins . Electricity for free --- The dirty underbelly of SCADA and smart meters . In BlackHat USA , 2010 . J. Pollet and J. Cummins. Electricity for free --- The dirty underbelly of SCADA and smart meters. In BlackHat USA, 2010."},{"key":"e_1_3_2_1_51_1","volume-title":"Slammer worm crashed Ohio nuke plant network","author":"Poulsen K.","year":"2003","unstructured":"K. Poulsen . Slammer worm crashed Ohio nuke plant network , 2003 . K. Poulsen. Slammer worm crashed Ohio nuke plant network, 2003."},{"key":"e_1_3_2_1_52_1","author":"PR","year":"2003","unstructured":"PR Newswire. Computer virus strikes CSX transportation computers , 2003 . PR Newswire. Computer virus strikes CSX transportation computers, 2003.","journal-title":"Newswire. Computer virus strikes CSX transportation computers"},{"key":"e_1_3_2_1_53_1","volume-title":"The Third Industrial Revolution: How Lateral Power is Transforming Energy, the Economy, and the World","author":"Rifkin J.","year":"2011","unstructured":"J. Rifkin . The Third Industrial Revolution: How Lateral Power is Transforming Energy, the Economy, and the World . Palgrave MacMillan , 2011 . J. Rifkin. The Third Industrial Revolution: How Lateral Power is Transforming Energy, the Economy, and the World. Palgrave MacMillan, 2011."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516658"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2335155"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998432"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69170-9_25"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/2691365.2691401"},{"key":"e_1_3_2_1_62_1","volume-title":"BlackHat Europe","author":"Soullie A.","year":"2014","unstructured":"A. Soullie . Industrial control systems: Pentesting PLCs 101 . In BlackHat Europe , 2014 . A. Soullie. Industrial control systems: Pentesting PLCs 101. In BlackHat Europe, 2014."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_20"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"e_1_3_2_1_66_1","volume-title":"Pervasive and Mobile Computing","author":"Truong H. T. T.","year":"2014","unstructured":"H. T. T. Truong , X. Gao , B. Shresthab , N. Saxena , N. Asokan , and P. Nurmi . Using contextual co-presence to strengthen zero-interaction authentication: Design, integration and usability . Pervasive and Mobile Computing , 2014 . H. T. T. Truong, X. Gao, B. Shresthab, N. Saxena, N. Asokan, and P. Nurmi. Using contextual co-presence to strengthen zero-interaction authentication: Design, integration and usability. Pervasive and Mobile Computing, 2014."},{"key":"e_1_3_2_1_67_1","unstructured":"Trusted Computing Group (TCG). Website 2011.  Trusted Computing Group (TCG). Website 2011."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414484"},{"key":"e_1_3_2_1_69_1","volume-title":"Internet of Things --- From Research and Innovation to Market Deployment","author":"Vermesan O.","year":"2014","unstructured":"O. Vermesan and P. Friess . Internet of Things --- From Research and Innovation to Market Deployment . River Publishers , 2014 . O. Vermesan and P. Friess. Internet of Things --- From Research and Innovation to Market Deployment. River Publishers, 2014."},{"key":"e_1_3_2_1_70_1","volume-title":"Stuxnet renews power grid security concerns","author":"Vijayan J.","year":"2010","unstructured":"J. Vijayan . Stuxnet renews power grid security concerns , 2010 . J. Vijayan. Stuxnet renews power grid security concerns, 2010."},{"key":"e_1_3_2_1_71_1","volume-title":"Eberbacher Gespr\u00e4ch zu \"Sicherheit in der Industrie 4.0","author":"Waidner M.","year":"2013","unstructured":"M. Waidner , M. Kasper , T. Henkel , C. Rudolph , and O. K\u00fcch . Eberbacher Gespr\u00e4ch zu \"Sicherheit in der Industrie 4.0 \", 2013 . M. Waidner, M. Kasper, T. Henkel, C. Rudolph, and O. K\u00fcch. Eberbacher Gespr\u00e4ch zu \"Sicherheit in der Industrie 4.0\", 2013."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456460"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.113"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2010.02.008"}],"event":{"name":"DAC '15: The 52nd Annual Design Automation Conference 2015","location":"San Francisco California","acronym":"DAC '15","sponsor":["SIGDA ACM Special Interest Group on Design Automation"]},"container-title":["Proceedings of the 52nd Annual Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2744769.2747942","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2744769.2747942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:36Z","timestamp":1750227156000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2744769.2747942"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,7]]},"references-count":76,"alternative-id":["10.1145\/2744769.2747942","10.1145\/2744769"],"URL":"https:\/\/doi.org\/10.1145\/2744769.2747942","relation":{},"subject":[],"published":{"date-parts":[[2015,6,7]]},"assertion":[{"value":"2015-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}