{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:10:46Z","timestamp":1777129846038,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EC SPRIDE"},{"name":"CROSSING","award":["CRC 1119"],"award-info":[{"award-number":["CRC 1119"]}]},{"name":"Intel CRI for Secure Computing"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813670","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"964-975","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":169,"title":["SEDA"],"prefix":"10.1145","author":[{"given":"N.","family":"Asokan","sequence":"first","affiliation":[{"name":"Aalto University and University of Helsinki, Espoo and Helsinki, Finland"}]},{"given":"Ferdinand","family":"Brasser","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Ahmad","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Matthias","family":"Schunter","sequence":"additional","affiliation":[{"name":"Intel Labs, Portland, OR, USA"}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Christian","family":"Wachsmann","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Almi'Ani. NBA: A novel broadcasting algorithm for wireless sensor networks. In phIFIP International Conference on Wireless and Optical Communications Networks","author":"Ababneh N.","year":"2008","unstructured":"N. Ababneh , S. Selvakennedy , and K. Almi'Ani. NBA: A novel broadcasting algorithm for wireless sensor networks. In phIFIP International Conference on Wireless and Optical Communications Networks , 2008 . N. Ababneh, S. Selvakennedy, and K. Almi'Ani. NBA: A novel broadcasting algorithm for wireless sensor networks. In phIFIP International Conference on Wireless and Optical Communications Networks, 2008."},{"key":"e_1_3_2_1_2_1","volume-title":"A secure and reliable bootstrap architecture. In phIEEE Symposium on Security and Privacy","author":"Arbaugh W.","year":"1997","unstructured":"W. Arbaugh , D. Farber , and J. Smith . A secure and reliable bootstrap architecture. In phIEEE Symposium on Security and Privacy , 1997 . W. Arbaugh, D. Farber, and J. Smith. A secure and reliable bootstrap architecture. In phIEEE Symposium on Security and Privacy, 1997."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516650"},{"key":"e_1_3_2_1_4_1","unstructured":"N. Asokan F. Brasser A. Ibrahim A.-R. Sadeghi M. Schunter G. Tsudik and C. Wachsmann. Seda. Technical report. URL https:\/\/trust.cased.de\/publications\/publication-details\/?tx_bibtex_pi1%5Bpub_id%5D=TUD-CS-2015--1195.  N. Asokan F. Brasser A. Ibrahim A.-R. Sadeghi M. Schunter G. Tsudik and C. Wachsmann. Seda. Technical report. URL https:\/\/trust.cased.de\/publications\/publication-details\/?tx_bibtex_pi1%5Bpub_id%5D=TUD-CS-2015--1195."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_3_2_1_6_1","volume-title":"The myths and facts behind cyber security risks for industrial control systems. Technical report","author":"Byres E.","year":"2004","unstructured":"E. Byres and J. Lowe . The myths and facts behind cyber security risks for industrial control systems. Technical report , PA Consulting Group , 2004 . E. Byres and J. Lowe. The myths and facts behind cyber security risks for industrial control systems. Technical report, PA Consulting Group, 2004."},{"key":"e_1_3_2_1_7_1","volume-title":"Key distribution mechanisms for wireless sensor networks: a survey. Technical report","author":"Camtepe S. A.","year":"2005","unstructured":"S. A. Camtepe and B. Yener . Key distribution mechanisms for wireless sensor networks: a survey. Technical report , 2005 . S. A. Camtepe and B. Yener. Key distribution mechanisms for wireless sensor networks: a survey. Technical report, 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180440"},{"key":"e_1_3_2_1_9_1","author":"Chan H.","year":"2007","unstructured":"H. Chan , A. Perrig , B. Przydatek , and D. Song . SIA: Secure information aggregation in sensor networks. Journal of Computer Security , 2007 . H. Chan, A. Perrig, B. Przydatek, and D. Song. SIA: Secure information aggregation in sensor networks. Journal of Computer Security, 2007.","journal-title":"Journal of Computer Security"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.219"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352568"},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Security Symposium","author":"Costin A.","year":"2014","unstructured":"A. Costin , J. Zaddach , A. Francillon , and D. Balzarotti . A large-scale analysis of the security of embedded firmwares . In USENIX Security Symposium , 2014 . A. Costin, J. Zaddach, A. Francillon, and D. Balzarotti. A large-scale analysis of the security of embedded firmwares. In USENIX Security Symposium, 2014."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30552-1_2"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2008.16"},{"key":"e_1_3_2_1_15_1","volume-title":"IEEE Global Telecommunications Conference","author":"Du W.","year":"2003","unstructured":"W. Du , J. Deng , Y.-S. Han , and P. Varshney . A witness-based approach for data fusion assurance in wsn . In IEEE Global Telecommunications Conference , 2003 . W. Du, J. Deng, Y.-S. Han, and P. Varshney. A witness-based approach for data fusion assurance in wsn. In IEEE Global Telecommunications Conference, 2003."},{"key":"e_1_3_2_1_16_1","volume-title":"Network and Distributed System Security Symposium","author":"Eldefrawy K.","year":"2012","unstructured":"K. Eldefrawy , G. Tsudik , A. Francillon , and D. Perito . SMART: Secure and minimal architecture for (establishing a dynamic) root of trust . In Network and Distributed System Security Symposium , 2012 . K. Eldefrawy, G. Tsudik, A. Francillon, and D. Perito. SMART: Secure and minimal architecture for (establishing a dynamic) root of trust. In Network and Distributed System Security Symposium, 2012."},{"key":"e_1_3_2_1_17_1","volume-title":"Automation & Test in Europe","author":"Francillon A.","year":"2014","unstructured":"A. Francillon , Q. Nguyen , K. B. Rasmussen , and G. Tsudik . A minimalist approach to remote attestation. In Design , Automation & Test in Europe , 2014 . A. Francillon, Q. Nguyen, K. B. Rasmussen, and G. Tsudik. A minimalist approach to remote attestation. In Design, Automation & Test in Europe, 2014."},{"key":"e_1_3_2_1_18_1","author":"Gandino F.","year":"2014","unstructured":"F. Gandino , B. Montrucchio , and M. Rebaudengo . Key management for static wireless sensor networks with node adding. IEEE Transactions on Industrial Informatics , 2014 . F. Gandino, B. Montrucchio, and M. Rebaudengo. Key management for static wireless sensor networks with node adding. IEEE Transactions on Industrial Informatics, 2014.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_2_1_19_1","author":"Higgins F.","year":"2009","unstructured":"F. Higgins , A. Tomlinson , and K. M. Martin . Threats to the swarm: Security considerations for swarm robotics. International Journal on Advances in Security , 2009 . F. Higgins, A. Tomlinson, and K. M. Martin. Threats to the swarm: Security considerations for swarm robotics. International Journal on Advances in Security, 2009.","journal-title":"International Journal on Advances in Security"},{"key":"e_1_3_2_1_20_1","volume-title":"Packet leashes: A defense against wormhole attacks in wireless networks","author":"Hu Y.-C.","year":"2003","unstructured":"Y.-C. Hu , A. Perrig , and D. Johnson . Packet leashes: A defense against wormhole attacks in wireless networks . In IEEE Computer and Communications , 2003 . Y.-C. Hu, A. Perrig, and D. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In IEEE Computer and Communications, 2003."},{"key":"e_1_3_2_1_21_1","volume-title":"BlackHat Europe","author":"Illera A. G.","year":"2014","unstructured":"A. G. Illera and J. V. Vidal . Lights off! The darkness of the smart meters . In BlackHat Europe , 2014 . A. G. Illera and J. V. Vidal. Lights off! The darkness of the smart meters. In BlackHat Europe, 2014."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30474-6_10"},{"key":"e_1_3_2_1_23_1","volume-title":"Attacks on power systems: Hackers, malware","author":"Kabay M. E.","year":"2010","unstructured":"M. E. Kabay . Attacks on power systems: Hackers, malware , 2010 . M. E. Kabay. Attacks on power systems: Hackers, malware, 2010."},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security Symposium","author":"Kennell R.","year":"2003","unstructured":"R. Kennell and L. H. Jamieson . Establishing the genuinity of remote computer systems . In USENIX Security Symposium , 2003 . R. Kennell and L. H. Jamieson. Establishing the genuinity of remote computer systems. In USENIX Security Symposium, 2003."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593192"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.45"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2012.49"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844142"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378395"},{"key":"e_1_3_2_1_33_1","volume-title":"Combined modeling and side channel attacks on strong pufs. IACR Cryptology ePrint Archive","author":"Mahmoud A.","year":"2013","unstructured":"A. Mahmoud , U. R\u00fchrmair , M. Majzoobi , and F. Koushanfar . Combined modeling and side channel attacks on strong pufs. IACR Cryptology ePrint Archive , 2013 . A. Mahmoud, U. R\u00fchrmair, M. Majzoobi, and F. Koushanfar. Combined modeling and side channel attacks on strong pufs. IACR Cryptology ePrint Archive, 2013."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.7"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7_38"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380790.2380805"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559851"},{"key":"e_1_3_2_1_38_1","volume-title":"http:\/\/omnetpp.org\/","year":"2015","unstructured":"OpenSim Ltd. OMNeT+ discrete event simulator. http:\/\/omnetpp.org\/ , 2015 . OpenSim Ltd. OMNeT+ discrete event simulator. http:\/\/omnetpp.org\/, 2015."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1775574.1775585"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.64"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5699-1_90"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.32"},{"key":"e_1_3_2_1_43_1","volume-title":"BlackHat USA","author":"Pollet J.","year":"2010","unstructured":"J. Pollet and J. Cummins . Electricity for free -- The dirty underbelly of SCADA and smart meters . In BlackHat USA , 2010 . J. Pollet and J. Cummins. Electricity for free -- The dirty underbelly of SCADA and smart meters. In BlackHat USA, 2010."},{"key":"e_1_3_2_1_44_1","volume-title":"ISCA Keynote","author":"Rattner J.","year":"2012","unstructured":"J. Rattner . Extreme scale computing . ISCA Keynote , 2012 . J. Rattner. Extreme scale computing. ISCA Keynote, 2012."},{"key":"e_1_3_2_1_45_1","volume-title":"Science","author":"Rubenstein M.","year":"2014","unstructured":"M. Rubenstein , A. Cornejo , and R. Nagpal . Programmable self-assembly in a thousand-robot swarm . Science , 2014 . M. Rubenstein, A. Cornejo, and R. Nagpal. Programmable self-assembly in a thousand-robot swarm. Science, 2014."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998432"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69170-9_25"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCITA.2014.6839249"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"G. Spanogiannopoulos N. Vlajic and D. Stevanovic. A simulation-based performance analysis of various multipath routing techniques in ZigBee sensor networks. Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering. 2010.  G. Spanogiannopoulos N. Vlajic and D. Stevanovic. A simulation-based performance analysis of various multipath routing techniques in ZigBee sensor networks. Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering. 2010.","DOI":"10.1007\/978-3-642-11723-7_20"},{"key":"e_1_3_2_1_51_1","volume-title":"http:\/\/www.trustedcomputinggroup.org","author":"Trusted Computing Group (TCG). Website.","year":"2015","unstructured":"Trusted Computing Group (TCG). Website. http:\/\/www.trustedcomputinggroup.org , 2015 . Trusted Computing Group (TCG). Website. http:\/\/www.trustedcomputinggroup.org, 2015."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414484"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.23"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2008.05.005"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958493"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/PAAP.2014.41"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813670"}},"subtitle":["Scalable Embedded Device Attestation"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":57,"alternative-id":["10.1145\/2810103.2813670","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813670","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}