{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:34Z","timestamp":1750221034307,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,28]],"date-time":"2018-11-28T00:00:00Z","timestamp":1543363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,28]]},"DOI":"10.1145\/3284869.3284885","type":"proceedings-article","created":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T18:39:17Z","timestamp":1546972757000},"page":"71-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Back To The Basics"],"prefix":"10.1145","author":[{"given":"Alberto","family":"Bartoli","sequence":"first","affiliation":[{"name":"University of Trieste, Trieste, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Eric","family":"Medvet","sequence":"additional","affiliation":[{"name":"University of Trieste, Trieste, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Andrea","family":"De Lorenzo","sequence":"additional","affiliation":[{"name":"University of Trieste, Trieste, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Fabiano","family":"Tarlao","sequence":"additional","affiliation":[{"name":"University of Trieste, Trieste, Italy"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,11,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. Google Safe Browsing. https:\/\/safebrowsing.google.com\/. Accessed: 2018-8-18.  {n. d.}. Google Safe Browsing. https:\/\/safebrowsing.google.com\/. Accessed: 2018-8-18."},{"key":"e_1_3_2_1_2_1","unstructured":"Nate Anderson. 2013. How a banner ad for H&R Block appeared on apple.com---without Apple's OK. https:\/\/arstechnica.com\/tech-policy\/2013\/04\/how-a-banner-ad-for-hs-ok\/. Accessed: 2018-8-18.  Nate Anderson. 2013. How a banner ad for H&R Block appeared on apple.com---without Apple's OK. https:\/\/arstechnica.com\/tech-policy\/2013\/04\/how-a-banner-ad-for-hs-ok\/. Accessed: 2018-8-18."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180485"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.91"},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Security Symposium. 595--610","author":"Borgolte Kevin","year":"2015","unstructured":"Kevin Borgolte , Christopher Kruegel , and Giovanni Vigna . 2015 . Meerkat: Detecting Website Defacements through Image-based Object Recognition .. In USENIX Security Symposium. 595--610 . Kevin Borgolte, Christopher Kruegel, and Giovanni Vigna. 2015. Meerkat: Detecting Website Defacements through Image-based Object Recognition.. In USENIX Security Symposium. 595--610."},{"key":"e_1_3_2_1_6_1","unstructured":"Russell Brandom. 2015. New vulnerability lets attackers hijack Chrysler vehicles remotely. https:\/\/www.theverge.com\/2015\/7\/21\/9009213\/chrysler-uconnect-vulnerability-car-hijack. Accessed: 2018-8-18.  Russell Brandom. 2015. New vulnerability lets attackers hijack Chrysler vehicles remotely. https:\/\/www.theverge.com\/2015\/7\/21\/9009213\/chrysler-uconnect-vulnerability-car-hijack. Accessed: 2018-8-18."},{"key":"e_1_3_2_1_7_1","unstructured":"Matt Burgess. {n. d.}. Smart dildos and vibrators keep getting hacked -- but Tor could be the answer to safer connected sex. https:\/\/www.wired.co.uk\/article\/sex-toy-bluetooth-hacks-security-fix. Accessed: 2018-8-18.  Matt Burgess. {n. d.}. Smart dildos and vibrators keep getting hacked -- but Tor could be the answer to safer connected sex. https:\/\/www.wired.co.uk\/article\/sex-toy-bluetooth-hacks-security-fix. Accessed: 2018-8-18."},{"key":"e_1_3_2_1_8_1","volume-title":"Apple will require HTTPS connections for iOS apps by the end of","author":"Conger Kate","year":"2016","unstructured":"Kate Conger . 2016. Apple will require HTTPS connections for iOS apps by the end of 2016 . TechCrunch (June 2016). Kate Conger. 2016. Apple will require HTTPS connections for iOS apps by the end of 2016. TechCrunch (June 2016)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.04.038"},{"key":"e_1_3_2_1_10_1","unstructured":"Lorenzo Franceschi-Bicchierai. 2017. A Hackable Dishwasher Is Connecting Hospitals to the Internet of Shit. https:\/\/motherboard.vice.com\/en_us\/article\/pg9qkv\/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit. Accessed: 2018-8-19.  Lorenzo Franceschi-Bicchierai. 2017. A Hackable Dishwasher Is Connecting Hospitals to the Internet of Shit. https:\/\/motherboard.vice.com\/en_us\/article\/pg9qkv\/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit. Accessed: 2018-8-19."},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security Symposium.","author":"Gabi Nakibly","year":"2016","unstructured":"Nakibly Gabi , Schcolnik Jaime , and Rubin Yossi . 2016 . Website-Targeted False Content Injection by Network Operators . In USENIX Security Symposium. Nakibly Gabi, Schcolnik Jaime, and Rubin Yossi. 2016. Website-Targeted False Content Injection by Network Operators. In USENIX Security Symposium."},{"key":"e_1_3_2_1_12_1","unstructured":"Ryan Gallagher and Glenn Greenwald. 2014. How the NSA Plans to Infect 'Millions' of Computers with Malware. https:\/\/theintercept.com\/2014\/03\/12\/nsa-plans-infect-millions-computers-malware\/. Accessed: 2018-8-18.  Ryan Gallagher and Glenn Greenwald. 2014. How the NSA Plans to Infect 'Millions' of Computers with Malware. https:\/\/theintercept.com\/2014\/03\/12\/nsa-plans-infect-millions-computers-malware\/. Accessed: 2018-8-18."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314391"},{"key":"e_1_3_2_1_14_1","unstructured":"Google. 2018. Protecting users with TLS by default in Android P. https:\/\/android-developers.googleblog.com\/2018\/04\/protecting-users-with-tls-by-default-in.html. Accessed: 2018-4-12.  Google. 2018. Protecting users with TLS by default in Android P. https:\/\/android-developers.googleblog.com\/2018\/04\/protecting-users-with-tls-by-default-in.html. Accessed: 2018-4-12."},{"key":"e_1_3_2_1_15_1","volume-title":"How Hacked Water Heaters Could Trigger Mass Blackouts. Wired (Aug","author":"Greenberg Andy","year":"2018","unstructured":"Andy Greenberg , Emily Dreyfuss , Brian Barrett , Danny Gold , Issie Lapowsky , and Lily Hay Newman . 2018. How Hacked Water Heaters Could Trigger Mass Blackouts. Wired (Aug . 2018 ). Andy Greenberg, Emily Dreyfuss, Brian Barrett, Danny Gold, Issie Lapowsky, and Lily Hay Newman. 2018. How Hacked Water Heaters Could Trigger Mass Blackouts. Wired (Aug. 2018)."},{"key":"e_1_3_2_1_16_1","volume-title":"Emily Dreyfuss, Brian Barrett, Danny Gold, and Issie Lapowsky.","author":"Greenberg Andy","year":"2014","unstructured":"Andy Greenberg , Lily Hay Newman , Emily Dreyfuss, Brian Barrett, Danny Gold, and Issie Lapowsky. 2014 . Hacker Redirects Traffic From 19 Internet Providers to Steal Bitcoins. Wired (Aug . 2014). Andy Greenberg, Lily Hay Newman, Emily Dreyfuss, Brian Barrett, Danny Gold, and Issie Lapowsky. 2014. Hacker Redirects Traffic From 19 Internet Providers to Steal Bitcoins. Wired (Aug. 2014)."},{"key":"e_1_3_2_1_17_1","volume-title":"Security Engineering, and IoT Legislation. Technology Innovation Management Review (April","author":"Hypponen Mikko","year":"2017","unstructured":"Mikko Hypponen and Linus Nyman . 2017. The Internet of (Vulnerable) Things: On Hypponen's Law , Security Engineering, and IoT Legislation. Technology Innovation Management Review (April 2017 ). Mikko Hypponen and Linus Nyman. 2017. The Internet of (Vulnerable) Things: On Hypponen's Law, Security Engineering, and IoT Legislation. Technology Innovation Management Review (April 2017)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133958"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961202"},{"key":"e_1_3_2_1_20_1","volume-title":"Why Light Bulbs May Be the Next Hacker Target. The New York Times (Nov","author":"Markoff John","year":"2016","unstructured":"John Markoff . 2016. Why Light Bulbs May Be the Next Hacker Target. The New York Times (Nov . 2016 ). John Markoff. 2016. Why Light Bulbs May Be the Next Hacker Target. The New York Times (Nov. 2016)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2011.101"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2014.152"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Youssef Meguebli Mouna Kacimi Bich-Li\u00ean Doan and Fabrice Popineau. 2014. Unsupervised Approach for Identifying Users' Political Orientations. In ECIR.  Youssef Meguebli Mouna Kacimi Bich-Li\u00ean Doan and Fabrice Popineau. 2014. Unsupervised Approach for Identifying Users' Political Orientations. In ECIR.","DOI":"10.1007\/978-3-319-06028-6_49"},{"key":"e_1_3_2_1_24_1","unstructured":"Shaun Nichols. 2018. AWS DNS network hijack turns MyEtherWallet into ThievesEtherWallet. https:\/\/www.theregister.co.uk\/2018\/04\/24\/myetherwallet_dns_hijack\/. Accessed: 2018-8-18.  Shaun Nichols. 2018. AWS DNS network hijack turns MyEtherWallet into ThievesEtherWallet. https:\/\/www.theregister.co.uk\/2018\/04\/24\/myetherwallet_dns_hijack\/. Accessed: 2018-8-18."},{"key":"e_1_3_2_1_25_1","unstructured":"Charlie Osborne. 2018. Over a dozen vulnerabilities uncovered in BMW vehicles | ZDNet. https:\/\/www.zdnet.com\/article\/over-a-dozen-vulnerabilities-uncovered-in-bmw-vehicles\/. Accessed: 2018-8-18.  Charlie Osborne. 2018. Over a dozen vulnerabilities uncovered in BMW vehicles | ZDNet. https:\/\/www.zdnet.com\/article\/over-a-dozen-vulnerabilities-uncovered-in-bmw-vehicles\/. Accessed: 2018-8-18."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.190"},{"key":"e_1_3_2_1_27_1","unstructured":"Emily Schechter. 2018. A milestone for Chrome security: marking HTTP as \"not secure\". https:\/\/www.blog.google\/products\/chrome\/milestone-chrome-security-marking-http-not-secure\/. Accessed: 2018-8-18.  Emily Schechter. 2018. A milestone for Chrome security: marking HTTP as \"not secure\". https:\/\/www.blog.google\/products\/chrome\/milestone-chrome-security-marking-http-not-secure\/. Accessed: 2018-8-18."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180493"},{"key":"e_1_3_2_1_29_1","unstructured":"Ms Smith. 2017. 465 000 Abbott pacemakers vulnerable to hacking need a firmware fix. https:\/\/www.csoonline.com\/article\/3222068\/hacking\/465000-abbott-pacemakers-vulnerable-to-hacking-need-a-firmware-fix.html. Accessed: 2018-8-18.  Ms Smith. 2017. 465 000 Abbott pacemakers vulnerable to hacking need a firmware fix. https:\/\/www.csoonline.com\/article\/3222068\/hacking\/465000-abbott-pacemakers-vulnerable-to-hacking-need-a-firmware-fix.html. Accessed: 2018-8-18."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18714-3_36"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019798"},{"volume-title":"The Ransomware Attack That Locked Hotel Guests Out of Their Rooms","author":"Wolff Josephine","key":"e_1_3_2_1_32_1","unstructured":"Josephine Wolff . 2017. The Ransomware Attack That Locked Hotel Guests Out of Their Rooms . http:\/\/www.slate.com\/articles\/technology\/future_tense\/2017\/02\/the_ransomware_attack_that_locked_hotel_guests_out_of_their_rooms.html. Accessed: 2018-8-18. Josephine Wolff. 2017. The Ransomware Attack That Locked Hotel Guests Out of Their Rooms. http:\/\/www.slate.com\/articles\/technology\/future_tense\/2017\/02\/the_ransomware_attack_that_locked_hotel_guests_out_of_their_rooms.html. Accessed: 2018-8-18."}],"event":{"name":"Goodtechs '18: International Conference on Smart Objects and Technologies for Social Good","sponsor":["EAI The European Alliance for Innovation"],"location":"Bologna Italy","acronym":"Goodtechs '18"},"container-title":["Proceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3284869.3284885","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3284869.3284885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:34Z","timestamp":1750207414000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3284869.3284885"}},"subtitle":["Security of Software Downloads for Smart Objects"],"short-title":[],"issued":{"date-parts":[[2018,11,28]]},"references-count":32,"alternative-id":["10.1145\/3284869.3284885","10.1145\/3284869"],"URL":"https:\/\/doi.org\/10.1145\/3284869.3284885","relation":{},"subject":[],"published":{"date-parts":[[2018,11,28]]},"assertion":[{"value":"2018-11-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}