{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T07:33:54Z","timestamp":1766820834497,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,16]],"date-time":"2015-11-16T00:00:00Z","timestamp":1447632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11,16]]},"DOI":"10.1145\/2834050.2834095","type":"proceedings-article","created":{"date-parts":[[2015,11,9]],"date-time":"2015-11-09T16:29:04Z","timestamp":1447086544000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":218,"title":["Handling a trillion (unfixable) flaws on a billion devices"],"prefix":"10.1145","author":[{"given":"Tianlong","family":"Yu","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Vyas","family":"Sekar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Srinivasan","family":"Seshan","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Yuvraj","family":"Agarwal","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Chenren","family":"Xu","sequence":"additional","affiliation":[{"name":"CECA Peking University"}]}],"member":"320","published-online":{"date-parts":[[2015,11,16]]},"reference":[{"unstructured":"Belkin Wemo. http:\/\/www.belkin.com\/us\/Products\/home-automation\/c\/wemo-home-automation\/.  Belkin Wemo. http:\/\/www.belkin.com\/us\/Products\/home-automation\/c\/wemo-home-automation\/.","key":"e_1_3_2_2_1_1"},{"unstructured":"Commtouch Antivirus for Embedded OS Datasheet. http:\/\/www.commtouch.com\/uploads\/pdf\/Commtouch-Antivirus-for-Embedded-OS-Datasheet.pdf.  Commtouch Antivirus for Embedded OS Datasheet. http:\/\/www.commtouch.com\/uploads\/pdf\/Commtouch-Antivirus-for-Embedded-OS-Datasheet.pdf.","key":"e_1_3_2_2_2_1"},{"unstructured":"Fridge sends spam emails as attack hits smart gadgets. http:\/\/www.bbc.com\/news\/technology-25780908.  Fridge sends spam emails as attack hits smart gadgets. http:\/\/www.bbc.com\/news\/technology-25780908.","key":"e_1_3_2_2_3_1"},{"unstructured":"Gartner Says 4.9 Billion Connected \"Things\" Will Be in Use in 2015. http:\/\/www.gartner.com\/newsroom\/id\/2905717.  Gartner Says 4.9 Billion Connected \"Things\" Will Be in Use in 2015. http:\/\/www.gartner.com\/newsroom\/id\/2905717.","key":"e_1_3_2_2_4_1"},{"unstructured":"Google ON hub. https:\/\/on.google.com\/hub\/.  Google ON hub. https:\/\/on.google.com\/hub\/.","key":"e_1_3_2_2_5_1"},{"unstructured":"Hackers attack shipping and logistics firms using malware laden handheld scanners. http:\/\/www.securityweek.com\/hackers-attack-shipping-and-logistics-firms-using-malware-laden-handheld-scanners.  Hackers attack shipping and logistics firms using malware laden handheld scanners. http:\/\/www.securityweek.com\/hackers-attack-shipping-and-logistics-firms-using-malware-laden-handheld-scanners.","key":"e_1_3_2_2_6_1"},{"unstructured":"IFTTT Recipes. https:\/\/ifttt.com\/recipes.  IFTTT Recipes. https:\/\/ifttt.com\/recipes.","key":"e_1_3_2_2_7_1"},{"unstructured":"Monkey. http:\/\/developer.android.com\/tools\/help\/monkey.html.  Monkey. http:\/\/developer.android.com\/tools\/help\/monkey.html.","key":"e_1_3_2_2_8_1"},{"unstructured":"NEST. https:\/\/nest.com\/.  NEST. https:\/\/nest.com\/.","key":"e_1_3_2_2_9_1"},{"unstructured":"Netflix Simian Army. https:\/\/github.com\/Netflix\/SimianArmy.  Netflix Simian Army. https:\/\/github.com\/Netflix\/SimianArmy.","key":"e_1_3_2_2_10_1"},{"unstructured":"OpenDayLight. http:\/\/www.opendaylight.org\/.  OpenDayLight. http:\/\/www.opendaylight.org\/.","key":"e_1_3_2_2_11_1"},{"unstructured":"Samsung Smartthings. http:\/\/www.smartthings.com\/.  Samsung Smartthings. http:\/\/www.smartthings.com\/.","key":"e_1_3_2_2_12_1"},{"unstructured":"Scout Alarm. https:\/\/www.scoutalarm.com\/.  Scout Alarm. https:\/\/www.scoutalarm.com\/.","key":"e_1_3_2_2_13_1"},{"unstructured":"SHODAN. https:\/\/www.shodan.io\/.  SHODAN. https:\/\/www.shodan.io\/.","key":"e_1_3_2_2_14_1"},{"unstructured":"Smart meters can be hacked to cut power bills. http:\/\/www.bbc.com\/news\/technology-29643276.  Smart meters can be hacked to cut power bills. http:\/\/www.bbc.com\/news\/technology-29643276.","key":"e_1_3_2_2_15_1"},{"unstructured":"Squid. http:\/\/www.squid-cache.org\/.  Squid. http:\/\/www.squid-cache.org\/.","key":"e_1_3_2_2_16_1"},{"unstructured":"The Internet of Things Is Wildly Insecure - And Often Unpatchable. http: \/\/www.wired.com\/2014\/01\/theres-no-good-way-to-patch-the-internet-of-things-and-thats-a-huge-problem\/.  The Internet of Things Is Wildly Insecure - And Often Unpatchable. http: \/\/www.wired.com\/2014\/01\/theres-no-good-way-to-patch-the-internet-of-things-and-thats-a-huge-problem\/.","key":"e_1_3_2_2_17_1"},{"unstructured":"Will giving the internet eyes and ears mean the end of privacy? http:\/\/www.theguardian.com\/technology\/2013\/may\/16\/internet-of-things-privacy-google.  Will giving the internet eyes and ears mean the end of privacy? http:\/\/www.theguardian.com\/technology\/2013\/may\/16\/internet-of-things-privacy-google.","key":"e_1_3_2_2_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_2_20_1","volume-title":"USENIX Security Symposium","author":"Costin A.","year":"2014","unstructured":"A. Costin , J. Zaddach , A. Francillon , D. Balzarotti , and S. Antipolis . A large-scale analysis of the security of embedded firmwares . In USENIX Security Symposium , 2014 . A. Costin, J. Zaddach, A. Francillon, D. Balzarotti, and S. Antipolis. A large-scale analysis of the security of embedded firmwares. In USENIX Security Symposium, 2014."},{"key":"e_1_3_2_2_21_1","first-page":"8","volume-title":"Parallel and Distributed Processing Symposium, 2003. Proceedings. International","author":"Datta A. K.","unstructured":"A. K. Datta , M. Gradinariu , M. Raynal , and G. Simon . Anonymous publish\/subscribe in p2p networks . In Parallel and Distributed Processing Symposium, 2003. Proceedings. International , pages 8 --pp. IEEE, 2003. A. K. Datta, M. Gradinariu, M. Raynal, and G. Simon. Anonymous publish\/subscribe in p2p networks. In Parallel and Distributed Processing Symposium, 2003. Proceedings. International, pages 8--pp. IEEE, 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1145\/2090147.2094081"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_23_1","DOI":"10.1109\/SP.2012.48"},{"key":"e_1_3_2_2_24_1","volume-title":"Onix: A Distributed Control Platform for Large-scale Production Network. In Proc. OSDI","author":"Koponen T.","year":"2010","unstructured":"T. Koponen Onix: A Distributed Control Platform for Large-scale Production Network. In Proc. OSDI , 2010 . T. Koponen et al. Onix: A Distributed Control Platform for Large-scale Production Network. In Proc. OSDI, 2010."},{"key":"e_1_3_2_2_25_1","first-page":"1","volume-title":"NSDI","volume":"4","author":"Levis P.","year":"2004","unstructured":"P. Levis , S. Madden , D. Gay , J. Polastre , R. Szewczyk , A. Woo , E. A. Brewer , and D. E. Culler . The emergence of networking abstractions and techniques in tinyos . In NSDI , volume 4 , pages 1 -- 1 , 2004 . P. Levis, S. Madden, D. Gay, J. Polastre, R. Szewczyk, A. Woo, E. A. Brewer, and D. E. Culler. The emergence of networking abstractions and techniques in tinyos. In NSDI, volume 4, pages 1--1, 2004."},{"key":"e_1_3_2_2_26_1","volume-title":"12th USENIX Symposium on Networked System Design and Implementation","author":"Madhavapeddy A.","year":"2015","unstructured":"A. Madhavapeddy , T. Leonard , M. Skjegstad , T. Gazagnaire , D. Sheets , D. Scott , R. Mortier , A. Chaudhry , B. Singh , J. Ludlam , : Just-in-time summoning of unikernels . In 12th USENIX Symposium on Networked System Design and Implementation , 2015 . A. Madhavapeddy, T. Leonard, M. Skjegstad, T. Gazagnaire, D. Sheets, D. Scott, R. Mortier, A. Chaudhry, B. Singh, J. Ludlam, et al. Jitsu: Just-in-time summoning of unikernels. In 12th USENIX Symposium on Networked System Design and Implementation, 2015."},{"key":"e_1_3_2_2_27_1","volume-title":"Proc. NSDI","author":"Martins J.","year":"2014","unstructured":"J. Martins , M. Ahmed , C. Raiciu , V. Olteanu , M. Honda , R. Bifulco , and F. Huici . ClickOS and the art of network function virtualization . In Proc. NSDI , 2014 . J. Martins, M. Ahmed, C. Raiciu, V. Olteanu, M. Honda, R. Bifulco, and F. Huici. ClickOS and the art of network function virtualization. In Proc. NSDI, 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_28_1","DOI":"10.1145\/1851275.1851199"},{"key":"e_1_3_2_2_29_1","volume-title":"HotNets. Citeseer","author":"Mittal P.","year":"2009","unstructured":"P. Mittal , V. Paxson , R. Sommer , and M. Winterrowd . Securing mediated trace access using black-box permutation analysis . In HotNets. Citeseer , 2009 . P. Mittal, V. Paxson, R. Sommer, and M. Winterrowd. Securing mediated trace access using black-box permutation analysis. In HotNets. Citeseer, 2009."},{"key":"e_1_3_2_2_30_1","volume-title":"USENIX security","author":"Ou X.","year":"2005","unstructured":"X. Ou , S. Govindavajhala , and A. W. Appel . Mulval: A logic-based network security analyzer . In USENIX security , 2005 . X. Ou, S. Govindavajhala, and A. W. Appel. Mulval: A logic-based network security analyzer. In USENIX security, 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_31_1","DOI":"10.1145\/1555816.1555830"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_32_1","DOI":"10.1109\/MIS.2009.81"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_33_1","DOI":"10.1145\/2785956.2787506"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_34_1","DOI":"10.1145\/2594368.2594377"},{"key":"e_1_3_2_2_35_1","first-page":"229","volume-title":"LISA","volume":"99","author":"Roesch M.","year":"1999","unstructured":"M. Roesch : Lightweight intrusion detection for networks . In LISA , volume 99 , pages 229 -- 238 , 1999 . M. Roesch et al. Snort: Lightweight intrusion detection for networks. In LISA, volume 99, pages 229--238, 1999."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_36_1","DOI":"10.5555\/829514.830526"},{"key":"e_1_3_2_2_37_1","volume-title":"USENIX NSDI","volume":"6","author":"Walsh K.","year":"2006","unstructured":"K. Walsh and E. G. Sirer . Experience with an object reputation system for peer-to-peer filesharing . In USENIX NSDI , volume 6 , 2006 . K. Walsh and E. G. Sirer. Experience with an object reputation system for peer-to-peer filesharing. In USENIX NSDI, volume 6, 2006."}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","CISCO"],"acronym":"HotNets-XIV","name":"HotNets-XIV: The 14th ACM Workshop on Hot Topics in Networks","location":"Philadelphia PA USA"},"container-title":["Proceedings of the 14th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2834050.2834095","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2834050.2834095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:17Z","timestamp":1750225397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2834050.2834095"}},"subtitle":["Rethinking network security for the Internet-of-Things"],"short-title":[],"issued":{"date-parts":[[2015,11,16]]},"references-count":37,"alternative-id":["10.1145\/2834050.2834095","10.1145\/2834050"],"URL":"https:\/\/doi.org\/10.1145\/2834050.2834095","relation":{},"subject":[],"published":{"date-parts":[[2015,11,16]]},"assertion":[{"value":"2015-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}