{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:10:49Z","timestamp":1777129849877,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DFG","award":["CRC 1119 CROSSING"],"award-info":[{"award-number":["CRC 1119 CROSSING"]}]},{"name":"LOEWE","award":["NICER"],"award-info":[{"award-number":["NICER"]}]},{"name":"Hessen State Ministry for Higher Education Research and the Arts (HMWK)","award":["CRISP"],"award-info":[{"award-number":["CRISP"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196544","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"329-342","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["SALAD"],"prefix":"10.1145","author":[{"given":"Florian","family":"Kohnh\u00e4user","sequence":"first","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Niklas","family":"B\u00fcscher","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Up 31 Percent From","author":"Billion Gartner Says","year":"2016","unstructured":"2017. Gartner Says 8.4 Billion Connected \"Things\" Will Be in Use in 2017 , Up 31 Percent From 2016 . (2017). http:\/\/www.gartner.com\/newsroom\/id\/3598917. 2017. Gartner Says 8.4 Billion Connected \"Things\" Will Be in Use in 2017, Up 31 Percent From 2016. (2017). http:\/\/www.gartner.com\/newsroom\/id\/3598917."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978335"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11734666_9"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"e_1_3_2_1_7_1","unstructured":"Daniel J Bernstein. 200"},{"key":"e_1_3_2_1_8_1","volume-title":"Hybrid cpu-gpu distributed framework for large scale mobile networks simulation","author":"Bilel Ben Romdhanne","unstructured":"Ben Romdhanne Bilel , Nikaein Navid , and Mohamed Said Mosli Bouksiaa . 2012. Hybrid cpu-gpu distributed framework for large scale mobile networks simulation . In IEEE\/ACM DS-RT. Ben Romdhanne Bilel, Nikaein Navid, and Mohamed Said Mosli Bouksiaa. 2012. Hybrid cpu-gpu distributed framework for large scale mobile networks simulation. In IEEE\/ACM DS-RT."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh Craig Gentry Ben Lynn and Hovav Shacham. 2003. Aggregate and verifiably encrypted signatures from bilinear maps. In EUROCRYPT.   Dan Boneh Craig Gentry Ben Lynn and Hovav Shacham. 2003. Aggregate and verifiably encrypted signatures from bilinear maps. In EUROCRYPT.","DOI":"10.1007\/3-540-39200-9_26"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/362342.362367"},{"key":"e_1_3_2_1_11_1","unstructured":"T Ryan Burchfield S Venkatesan and Douglas Weiner. 2007. Maximizing throughput in ZigBee wireless networks through analysis simulations and implementations. In LOCALALGOS.  T Ryan Burchfield S Venkatesan and Douglas Weiner. 2007. Maximizing throughput in ZigBee wireless networks through analysis simulations and implementations. In LOCALALGOS."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.1269130"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053010"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653711"},{"key":"e_1_3_2_1_15_1","unstructured":"Andrei Costin Jonas Zaddach Aur\u00e9lien Francillon Davide Balzarotti and Sophia Antipolis. 2014. A large-scale analysis of the security of embedded firmwares. In USENIX Security.   Andrei Costin Jonas Zaddach Aur\u00e9lien Francillon Davide Balzarotti and Sophia Antipolis. 2014. A large-scale analysis of the security of embedded firmwares. In USENIX Security."},{"key":"e_1_3_2_1_16_1","volume":"201","author":"Cui Ang","unstructured":"Ang Cui , Michael Costello , and Salvatore J Stolfo. 201 3. When Firmware Modifications Attack: A Case Study of Embedded Exploitation.. In NDSS. Ang Cui, Michael Costello, and Salvatore J Stolfo. 2013. When Firmware Modifications Attack: A Case Study of Embedded Exploitation.. In NDSS.","journal-title":"Salvatore J Stolfo."},{"key":"e_1_3_2_1_17_1","volume-title":"SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In NDSS.","author":"Eldefrawy Karim","year":"2012","unstructured":"Karim Eldefrawy , Gene Tsudik , Aur\u00e9lien Francillon , and Daniele Perito . 2012 . SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In NDSS. Karim Eldefrawy, Gene Tsudik, Aur\u00e9lien Francillon, and Daniele Perito. 2012. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In NDSS."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Aur\u00e9lien Francillon Quan Nguyen Kasper B Rasmussen and Gene Tsudik. 2014. A minimalist approach to remote attestation. In DATE.   Aur\u00e9lien Francillon Quan Nguyen Kasper B Rasmussen and Gene Tsudik. 2014. A minimalist approach to remote attestation. In DATE.","DOI":"10.7873\/DATE.2014.257"},{"key":"e_1_3_2_1_19_1","volume-title":"Adaptive routing in underwater delay\/disruption tolerant sensor networks","author":"Guo Zheng","unstructured":"Zheng Guo , Gioele Colombi , Bing Wang , Jun-Hong Cui , Dario Maggiorini , and Gian Paolo Rossi . 2008. Adaptive routing in underwater delay\/disruption tolerant sensor networks . In IEEE WONS. Zheng Guo, Gioele Colombi, Bing Wang, Jun-Hong Cui, Dario Maggiorini, and Gian Paolo Rossi. 2008. Adaptive routing in underwater delay\/disruption tolerant sensor networks. In IEEE WONS."},{"key":"e_1_3_2_1_20_1","volume-title":"Secure aggregation for wireless networks","author":"Hu Lingxuan","unstructured":"Lingxuan Hu and David Evans . 2003. Secure aggregation for wireless networks . In IEEE SAINT. Lingxuan Hu and David Evans. 2003. Secure aggregation for wireless networks. In IEEE SAINT."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939938"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098260"},{"key":"e_1_3_2_1_23_1","unstructured":"Intel Open Source Technology Center. 2017. TinyCrypt Cryptographic Library. https:\/\/github.com\/01org\/tinycrypt.  Intel Open Source Technology Center. 2017. TinyCrypt Cryptographic Library. https:\/\/github.com\/01org\/tinycrypt."},{"key":"e_1_3_2_1_24_1","volume-title":"Aggregate message authentication codes. Topics in Cryptology--CT-RSA 2008","author":"Katz Jonathan","year":"2008","unstructured":"Jonathan Katz and Andrew Lindell . 2008. Aggregate message authentication codes. Topics in Cryptology--CT-RSA 2008 ( 2008 ). Jonathan Katz and Andrew Lindell. 2008. Aggregate message authentication codes. Topics in Cryptology--CT-RSA 2008 (2008)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Ari Ker\u00e4nen J\u00f6rg Ott and Teemu K\u00e4rkk\u00e4inen. 2009. The ONE simulator for DTN protocol evaluation. In SIMUtools.  Ari Ker\u00e4nen J\u00f6rg Ott and Teemu K\u00e4rkk\u00e4inen. 2009. The ONE simulator for DTN protocol evaluation. In SIMUtools.","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098255"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.45"},{"key":"e_1_3_2_1_29_1","volume-title":"HMAC: Keyed-hashing for message authentication. In RFC 2104","author":"Krawczyk Hugo","year":"1997","unstructured":"Hugo Krawczyk , Ran Canetti , and Mihir Bellare . 1997 . HMAC: Keyed-hashing for message authentication. In RFC 2104 . Network Working Group . Hugo Krawczyk, Ran Canetti, and Mihir Bellare. 1997. HMAC: Keyed-hashing for message authentication. In RFC 2104. Network Working Group."},{"key":"e_1_3_2_1_30_1","volume-title":"Reaper: Calm Before the IoT Security Storm?","year":"2017","unstructured":"KrebsOnSecurity. 2017 . Reaper: Calm Before the IoT Security Storm? (2017). https: \/\/krebsonsecurity.com\/2017\/10\/reaper-calm-before-the-iot-security-storm\/. KrebsOnSecurity. 2017. Reaper: Calm Before the IoT Security Storm? (2017). https: \/\/krebsonsecurity.com\/2017\/10\/reaper-calm-before-the-iot-security-storm\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_28"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"e_1_3_2_1_34_1","volume-title":"Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors. In ESORICS.","author":"Schulz Steffen","year":"2017","unstructured":"Steffen Schulz , Andr\u00e9 Schaller , Florian Kohnh\u00e4user , and Stefan Katzenbeisser . 2017 . Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors. In ESORICS. Steffen Schulz, Andr\u00e9 Schaller, Florian Kohnh\u00e4user, and Stefan Katzenbeisser. 2017. Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors. In ESORICS."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322274"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69170-9_25"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_5"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2014.18"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Andr\u00e1s Varga and Rudolf Hornig. 2008. An overview of the OMNeT++ simulation environment. In SIMUTools.   Andr\u00e1s Varga and Rudolf Hornig. 2008. An overview of the OMNeT++ simulation environment. In SIMUTools.","DOI":"10.4108\/ICST.SIMUTOOLS2008.3027"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01440-6_10"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1380564.1380568"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.323440"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196544","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196544"}},"subtitle":["Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":42,"alternative-id":["10.1145\/3196494.3196544","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196544","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}