{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:26:18Z","timestamp":1775899578390,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Australian Research Council","award":["DP150100564"],"award-info":[{"award-number":["DP150100564"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134624","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"238-249","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Automated Analysis of Secure Internet of Things Protocols"],"prefix":"10.1145","author":[{"given":"Jun Young","family":"Kim","sequence":"first","affiliation":[{"name":"UNSW Australia, Data61 CSIRO, WBS Technology, Sydney, Australia"}]},{"given":"Ralph","family":"Holz","sequence":"additional","affiliation":[{"name":"The University of Sydney, Sydney, Australia"}]},{"given":"Wen","family":"Hu","sequence":"additional","affiliation":[{"name":"UNSW Australia, Data61 CSIRO, Sydney, Australia"}]},{"given":"Sanjay","family":"Jha","sequence":"additional","affiliation":[{"name":"UNSW Australia, Data61 CSIRO, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/tools.ietf.org\/html\/rfc5996. (2010). {Online","year":"2017","unstructured":"2010. https:\/\/tools.ietf.org\/html\/rfc5996. (2010). {Online ; accessed 24- May - 2017 }. 2010. https:\/\/tools.ietf.org\/html\/rfc5996. (2010). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/tools.ietf.org\/html\/draft-cragie-tls-ecjpake-00. (2010). {Online","year":"2017","unstructured":"2010. https:\/\/tools.ietf.org\/html\/draft-cragie-tls-ecjpake-00. (2010). {Online ; accessed 24- May - 2017 }. 2010. https:\/\/tools.ietf.org\/html\/draft-cragie-tls-ecjpake-00. (2010). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_3_1","volume-title":"The DDoS That Almost Broke the Internet. https:\/\/blog.cloudflare.com\/the-ddos-that-almost-broke-the-internet\/. (2013). {Online","year":"2017","unstructured":"2013. The DDoS That Almost Broke the Internet. https:\/\/blog.cloudflare.com\/the-ddos-that-almost-broke-the-internet\/. (2013). {Online ; accessed 24- May - 2017 }. 2013. The DDoS That Almost Broke the Internet. https:\/\/blog.cloudflare.com\/the-ddos-that-almost-broke-the-internet\/. (2013). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/tools.ietf.org\/html\/rfc7252. (2014). {Online","year":"2017","unstructured":"2014. https:\/\/tools.ietf.org\/html\/rfc7252. (2014). {Online ; accessed 24- May - 2017 }. 2014. https:\/\/tools.ietf.org\/html\/rfc7252. (2014). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/www.symantec.com\/connect\/blogs\/iot-worm-used-mine-cryptocurrency. (2015). {Online","year":"2017","unstructured":"2015. http:\/\/www.symantec.com\/connect\/blogs\/iot-worm-used-mine-cryptocurrency. (2015). {Online ; accessed 24- May - 2017 }. 2015. http:\/\/www.symantec.com\/connect\/blogs\/iot-worm-used-mine-cryptocurrency. (2015). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/tools.ietf.org\/html\/draft-hao-jpake-01\/. (2015). {Online","year":"2017","unstructured":"2015. http:\/\/tools.ietf.org\/html\/draft-hao-jpake-01\/. (2015). {Online ; accessed 24- May - 2017 }. 2015. http:\/\/tools.ietf.org\/html\/draft-hao-jpake-01\/. (2015). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/threadgroup.org\/RESOURCES\/White-Papers. (2015). {Online","year":"2017","unstructured":"2015. http:\/\/threadgroup.org\/RESOURCES\/White-Papers. (2015). {Online ; accessed 24- May - 2017 }. 2015. http:\/\/threadgroup.org\/RESOURCES\/White-Papers. (2015). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/tools.ietf.org\/html\/rfc6347. (2015). {Online","year":"2017","unstructured":"2015. https:\/\/tools.ietf.org\/html\/rfc6347. (2015). {Online ; accessed 24- May - 2017 }. 2015. https:\/\/tools.ietf.org\/html\/rfc6347. (2015). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_9_1","volume-title":"http:\/\/www.openmote.com\/. (2015). {Online","year":"2017","unstructured":"2015. http:\/\/www.openmote.com\/. (2015). {Online ; accessed 24- May - 2017 }. 2015. http:\/\/www.openmote.com\/. (2015). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_10_1","volume-title":"http:\/\/www.emarketer.com\/Article\/Security-Top-Barrier-Internet-of-Things-Growth\/1013624. (2016). {Online","year":"2017","unstructured":"2016. http:\/\/www.emarketer.com\/Article\/Security-Top-Barrier-Internet-of-Things-Growth\/1013624. (2016). {Online ; accessed 24- May - 2017 }. 2016. http:\/\/www.emarketer.com\/Article\/Security-Top-Barrier-Internet-of-Things-Growth\/1013624. (2016). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/github.com\/tamarin-prover\/tamarin-prover. (2016). {Online","year":"2017","unstructured":"2016. https:\/\/github.com\/tamarin-prover\/tamarin-prover. (2016). {Online ; accessed 24- May - 2017 }. 2016. https:\/\/github.com\/tamarin-prover\/tamarin-prover. (2016). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_12_1","volume-title":"2016 Dyn cyberattack. https:\/\/techcrunch.com\/2016\/10\/21\/many-sites-including-twitter-and-spotify-suffering-outage\/. (2016). {Online","year":"2017","unstructured":"2016. 2016 Dyn cyberattack. https:\/\/techcrunch.com\/2016\/10\/21\/many-sites-including-twitter-and-spotify-suffering-outage\/. (2016). {Online ; accessed 24- May - 2017 }. 2016. 2016 Dyn cyberattack. https:\/\/techcrunch.com\/2016\/10\/21\/many-sites-including-twitter-and-spotify-suffering-outage\/. (2016). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/www.lora-alliance.org\/What-Is-LoRa\/LoRaWAN-White-Papers. (2017). {Online","year":"2017","unstructured":"2017. https:\/\/www.lora-alliance.org\/What-Is-LoRa\/LoRaWAN-White-Papers. (2017). {Online ; accessed 24- May - 2017 }. 2017. https:\/\/www.lora-alliance.org\/What-Is-LoRa\/LoRaWAN-White-Papers. (2017). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/www.sigfox.com\/. (2017). {Online","year":"2017","unstructured":"2017. https:\/\/www.sigfox.com\/. (2017). {Online ; accessed 24- May - 2017 }. 2017. https:\/\/www.sigfox.com\/. (2017). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_15_1","volume-title":"http:\/\/mqtt.org\/. (2017). {Online","year":"2017","unstructured":"2017. http:\/\/mqtt.org\/. (2017). {Online ; accessed 24- May - 2017 }. 2017. http:\/\/mqtt.org\/. (2017). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_16_1","volume-title":"http:\/\/mqtt.org\/2013\/12\/mqtt-for-sensor-networks-mqtt-sn. (2017). {Online","year":"2017","unstructured":"2017. http:\/\/mqtt.org\/2013\/12\/mqtt-for-sensor-networks-mqtt-sn. (2017). {Online ; accessed 24- May - 2017 }. 2017. http:\/\/mqtt.org\/2013\/12\/mqtt-for-sensor-networks-mqtt-sn. (2017). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_17_1","volume-title":"http:\/\/www.ieee802.org\/15\/pub\/TG4.html. (2017). {Online","year":"2017","unstructured":"2017. http:\/\/www.ieee802.org\/15\/pub\/TG4.html. (2017). {Online ; accessed 24- May - 2017 }. 2017. http:\/\/www.ieee802.org\/15\/pub\/TG4.html. (2017). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_18_1","volume-title":"http:\/\/csrc.nist.gov\/groups\/STM\/cavp\/documents\/aes\/KAT_AES.zip. (2017). {Online","year":"2017","unstructured":"2017. http:\/\/csrc.nist.gov\/groups\/STM\/cavp\/documents\/aes\/KAT_AES.zip. (2017). {Online ; accessed 24- May - 2017 }. 2017. http:\/\/csrc.nist.gov\/groups\/STM\/cavp\/documents\/aes\/KAT_AES.zip. (2017). {Online; accessed 24-May-2017}."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.41"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.42"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_27"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813662"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"David Basin Sa\u0161a Radomirovic and Lara Schmid. 2016. Modeling Human Errors in Security Protocols. (2016).  David Basin Sa\u0161a Radomirovic and Lara Schmid. 2016. Modeling Human Errors in Security Protocols. (2016).","DOI":"10.1109\/CSF.2016.30"},{"key":"e_1_3_2_1_24_1","first-page":"241","article-title":"Cryptographic protocol for secure communications. (Aug. 31 1993)","volume":"5","author":"Bellovin Steven M","year":"1993","unstructured":"Steven M Bellovin and Michael Merritt . 1993 . Cryptographic protocol for secure communications. (Aug. 31 1993) . US Patent 5 , 241 ,599. Steven M Bellovin and Michael Merritt. 1993. Cryptographic protocol for secure communications. (Aug. 31 1993). US Patent 5,241,599.","journal-title":"US Patent"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2005.8"},{"key":"e_1_3_2_1_26_1","volume-title":"Resumption and Delayed Authentication. In Security and Privacy (SP), 2016 IEEE Symposium on. IEEE.","author":"Cremers Cas","unstructured":"Cas Cremers , Marko Horvat , Sam Scott , and Thyla van der Merwe. 2016. Automated Analysis and Verification of TLS 1.3: 0-RTT , Resumption and Delayed Authentication. In Security and Privacy (SP), 2016 IEEE Symposium on. IEEE. Cas Cremers, Marko Horvat, Sam Scott, and Thyla van der Merwe. 2016. Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication. In Security and Privacy (SP), 2016 IEEE Symposium on. IEEE."},{"key":"e_1_3_2_1_27_1","volume-title":"Netifera","author":"Duong Thai","year":"2011","unstructured":"Thai Duong and Juliano Rizzo . 2011. Here come the XOR Ninjas. White paper , Netifera ( 2011 ). Thai Duong and Juliano Rizzo. 2011. Here come the XOR Ninjas. White paper, Netifera (2011)."},{"key":"e_1_3_2_1_28_1","volume-title":"Christopher John Hogger, and John Alan Robinson","author":"Gabbay Dov M","year":"1998","unstructured":"Dov M Gabbay , Christopher John Hogger, and John Alan Robinson . 1998 . Handbook of Logic in Artificial Intelligence and Logic Programming: Volume 5: Logic Programming. Clarendon Press . Dov M Gabbay, Christopher John Hogger, and John Alan Robinson. 1998. Handbook of Logic in Artificial Intelligence and Logic Programming: Volume 5: Logic Programming. Clarendon Press."},{"key":"e_1_3_2_1_29_1","volume-title":"Transactions on computational science","author":"Hao Feng","unstructured":"Feng Hao and Peter Ryan . 2010. J-PAKE: authenticated key exchange without PKI . In Transactions on computational science XI. Springer , 192--206. Feng Hao and Peter Ryan. 2010. J-PAKE: authenticated key exchange without PKI. In Transactions on computational science XI. Springer, 192--206."},{"key":"e_1_3_2_1_30_1","first-page":"226","article-title":"Cryptographic methods for remote authentication. (May 1 2001)","volume":"6","author":"Jablon David P","year":"2001","unstructured":"David P Jablon . 2001 . Cryptographic methods for remote authentication. (May 1 2001) . US Patent 6 , 226 ,383. David P Jablon. 2001. Cryptographic methods for remote authentication. (May 1 2001). US Patent 6,226,383.","journal-title":"US Patent"},{"key":"e_1_3_2_1_31_1","first-page":"151","article-title":"Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks","volume":"99","author":"Juels Ari","year":"1999","unstructured":"Ari Juels and John G Brainard . 1999 . Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks . In NDSS , Vol. 99. 151 -- 165 . Ari Juels and John G Brainard. 1999. Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. In NDSS, Vol. 99. 151--165.","journal-title":"NDSS"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1759148.1759162"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098252"},{"key":"e_1_3_2_1_34_1","volume-title":"SEDA: Secure Over-The-Air Code Dissemination Protocol for the Internet of Things","author":"Kim Jun Young","year":"2016","unstructured":"Jun Young Kim , Wen Hu , Hossein Shafagh , and Sanjay Jha . 2016 . SEDA: Secure Over-The-Air Code Dissemination Protocol for the Internet of Things . IEEE Transactions on Dependable and Secure Computing ( 2016). Jun Young Kim, Wen Hu, Hossein Shafagh, and Sanjay Jha. 2016. SEDA: Secure Over-The-Air Code Dissemination Protocol for the Internet of Things. IEEE Transactions on Dependable and Secure Computing (2016)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.17"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779394.1779396"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30191-2_21"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29420-4_14"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.11"},{"key":"e_1_3_2_1_40_1","unstructured":"Ronald L Rivest Adi Shamir and David A Wagner. 1996. Time-lock puzzles and timed-release crypto. (1996).  Ronald L Rivest Adi Shamir and David A Wagner. 1996. Time-lock puzzles and timed-release crypto. (1996)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.25"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.19"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.140"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.274"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030117"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","location":"Orlando FL USA","acronym":"ACSAC 2017"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134624","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134624"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":47,"alternative-id":["10.1145\/3134600.3134624","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134624","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}