{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:31Z","timestamp":1750220971017,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T00:00:00Z","timestamp":1557014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,5]]},"DOI":"10.1145\/3312614.3312615","type":"proceedings-article","created":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T13:37:58Z","timestamp":1554730678000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["NeuroMesh"],"prefix":"10.1145","author":[{"given":"Gregory","family":"Falco","sequence":"first","affiliation":[{"name":"Computer Science and Artificial Intelligence Laboratory (CSAIL), Massachusetts Institute of Technology, Cambridge, Massachusetts"}]},{"given":"Caleb","family":"Li","sequence":"additional","affiliation":[{"name":"Sloan School of Management, Massachusetts Institute of Technology, Cambridge, Massachusetts"}]},{"given":"Pavel","family":"Fedorov","sequence":"additional","affiliation":[{"name":"Sloan School of Management, Massachusetts Institute of Technology, Cambridge, Massachusetts"}]},{"given":"Carlos","family":"Caldera","sequence":"additional","affiliation":[{"name":"Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, Massachusetts"}]},{"given":"Rahul","family":"Arora","sequence":"additional","affiliation":[{"name":"Sloan School of Management, Massachusetts Institute of Technology, Cambridge, Massachusetts"}]},{"given":"Kelly","family":"Jackson","sequence":"additional","affiliation":[{"name":"Sloan School of Management, Massachusetts Institute of Technology, Cambridge, Massachusetts"}]}],"member":"320","published-online":{"date-parts":[[2019,5,5]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2","article-title":"Multi-level Windows exploitation using Linux Operating System","volume":"5","author":"AbdulKhaleq Abdulrahman Aysar","year":"2016","journal-title":"Asian Journal of Natural Applied Sciences"},{"key":"e_1_3_2_1_2_1","unstructured":"US-CERT Alert. 2018. (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. US-CERT.gov (April 2018). https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-106A  US-CERT Alert. 2018. (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. US-CERT.gov (April 2018). https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-106A"},{"key":"e_1_3_2_1_3_1","unstructured":"Romain Bezut and Vivien Bernet-Rollande. 2010. Experimental study: Study of dictionary attacks on SSH. University of Technology of Compiegne (2010). https:\/\/files.xdec.net\/TX_EN_Bezut_Bernet-Rollande_BruteForce_SSH.pdf  Romain Bezut and Vivien Bernet-Rollande. 2010. Experimental study: Study of dictionary attacks on SSH. University of Technology of Compiegne (2010). https:\/\/files.xdec.net\/TX_EN_Bezut_Bernet-Rollande_BruteForce_SSH.pdf"},{"volume-title":"Encryption: Strengths and Weaknesses of Public-key Cryptography. Villanova.edu (January","year":"2007","author":"Blumenthal Matt","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"Catalin Cimpanu. 2018. Cyber-Attacks On US Critical Infrastructure Linked To Cisco Switch Flaw. BleepingComputer.com (2018). www.bleepingcomputer.com\/news\/security\/cyber-attacks-on-us-critical-infrastructure-linked-to-cisco-switch-flaw  Catalin Cimpanu. 2018. Cyber-Attacks On US Critical Infrastructure Linked To Cisco Switch Flaw. BleepingComputer.com (2018). www.bleepingcomputer.com\/news\/security\/cyber-attacks-on-us-critical-infrastructure-linked-to-cisco-switch-flaw"},{"key":"e_1_3_2_1_6_1","unstructured":"Cisco. 2017. Securing the Internet of Things: A Proposed Framework. Cisco.com (2017). https:\/\/www.cisco.com\/c\/en\/us\/about\/security-center\/secure-iot-proposed-framework.html  Cisco. 2017. Securing the Internet of Things: A Proposed Framework. Cisco.com (2017). https:\/\/www.cisco.com\/c\/en\/us\/about\/security-center\/secure-iot-proposed-framework.html"},{"key":"e_1_3_2_1_7_1","unstructured":"Jamie Condliffe. 2016. An $80M Bank Hack Has Been Blamed on $10 Routers. Gizmodo.com (April 2016). https:\/\/gizmodo.com\/an-80m-bank-hack-has-been-blamed-on-10-routers-1772442595  Jamie Condliffe. 2016. An $80M Bank Hack Has Been Blamed on $10 Routers. Gizmodo.com (April 2016). https:\/\/gizmodo.com\/an-80m-bank-hack-has-been-blamed-on-10-routers-1772442595"},{"key":"e_1_3_2_1_8_1","first-page":"7","article-title":"DDoS in the IoT","volume":"50","author":"Constantinos Kolias Angelos Stavrou","year":"2017","journal-title":"Mirai and Other Botnets. Computer"},{"key":"e_1_3_2_1_9_1","unstructured":"George Corser. 2017. Internet of Things (IoT) security and best practices. IEEE (February 2017). https:\/\/internetinitiative.ieee.org\/images\/files\/resources\/white_papers\/internet_of_things_feb2017.pdf  George Corser. 2017. Internet of Things (IoT) security and best practices. IEEE (February 2017). https:\/\/internetinitiative.ieee.org\/images\/files\/resources\/white_papers\/internet_of_things_feb2017.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"Darrell Etherington and Kate Conger. 2017. Large DDOS attacks cause outages at Twitter Spotify and other sites. TechCrunch.com (2017). https:\/\/techcrunch.com\/2016\/10\/21\/many-sites-including-twitter-and-spotify-suffering-outage\/  Darrell Etherington and Kate Conger. 2017. Large DDOS attacks cause outages at Twitter Spotify and other sites. TechCrunch.com (2017). https:\/\/techcrunch.com\/2016\/10\/21\/many-sites-including-twitter-and-spotify-suffering-outage\/"},{"key":"e_1_3_2_1_11_1","unstructured":"Dan Fagella. 2017. Self-driving car timeline for 11 top automakers. VentureBeat.com (June 2017). https:\/\/venturebeat.com\/2017\/06\/04\/self-driving-car-timeline-for-11-top-automakers\/  Dan Fagella. 2017. Self-driving car timeline for 11 top automakers. VentureBeat.com (June 2017). https:\/\/venturebeat.com\/2017\/06\/04\/self-driving-car-timeline-for-11-top-automakers\/"},{"key":"e_1_3_2_1_12_1","unstructured":"Gartner. 2017. Gartner Says 8.4 Billion Connected \"Things\" Will Be in Use in 2017. Gartner.com (2017). http:\/\/www.gartner.com\/newsroom\/id\/3598917  Gartner. 2017. Gartner Says 8.4 Billion Connected \"Things\" Will Be in Use in 2017. Gartner.com (2017). http:\/\/www.gartner.com\/newsroom\/id\/3598917"},{"key":"e_1_3_2_1_13_1","unstructured":"Dan Goodin. 2013. Anatomy of a hack: How crackers ransack passwords like qeadzcwrsfxv1331. ArsTechnica.com (May 2013). https:\/\/arstechnica.com\/information-technology\/2013\/05\/how-crackers-make-minced-meat-out-of-your-passwords\/3\/  Dan Goodin. 2013. Anatomy of a hack: How crackers ransack passwords like qeadzcwrsfxv1331. ArsTechnica.com (May 2013). https:\/\/arstechnica.com\/information-technology\/2013\/05\/how-crackers-make-minced-meat-out-of-your-passwords\/3\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Andy Greenberg. 2017. Hack brief: \"Devils Ivy\" vulnerability cold afflict millions of IoT devices. Wired.com (July 2017). https:\/\/www.wired.com\/story\/devils-ivy-iot-vulnerability\/  Andy Greenberg. 2017. Hack brief: \"Devils Ivy\" vulnerability cold afflict millions of IoT devices. Wired.com (July 2017). https:\/\/www.wired.com\/story\/devils-ivy-iot-vulnerability\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Andy Greenberg. 2017. Hackers are trying to reignite WannaCry with nonstop botnet attacks. Wired.com (May 2017). https:\/\/www.wired.com\/2017\/05\/wannacry-ransomware-ddos-attack\/  Andy Greenberg. 2017. Hackers are trying to reignite WannaCry with nonstop botnet attacks. Wired.com (May 2017). https:\/\/www.wired.com\/2017\/05\/wannacry-ransomware-ddos-attack\/"},{"key":"e_1_3_2_1_16_1","unstructured":"Juliana De Groot. 2019. The history of data breaches. DigitalGuardian.com (January 2019). https:\/\/digitalguardian.com\/blog\/history-data-breaches  Juliana De Groot. 2019. The history of data breaches. DigitalGuardian.com (January 2019). https:\/\/digitalguardian.com\/blog\/history-data-breaches"},{"key":"e_1_3_2_1_17_1","unstructured":"Swati Khandelwal. 2016. Linux TCP flaw allows hackers to hijack internet traffic and inject malware remotely. TheHackerNews.com (August 2016). https: \/\/thehackernews.com\/2016\/08\/linux-tcp-packet-hacking.html  Swati Khandelwal. 2016. Linux TCP flaw allows hackers to hijack internet traffic and inject malware remotely. TheHackerNews.com (August 2016). https: \/\/thehackernews.com\/2016\/08\/linux-tcp-packet-hacking.html"},{"key":"e_1_3_2_1_18_1","unstructured":"Swati Khandelwal. 2017. Hajime Vigilante Botnet Growing Rapidly; Hijacks 300 000 IoT Devices Worldwide. TheHackerNews.com (April 2017). https:\/\/thehackernews.com\/2017\/04\/vigilante-hacker-iot-botnet_26.html  Swati Khandelwal. 2017. Hajime Vigilante Botnet Growing Rapidly; Hijacks 300 000 IoT Devices Worldwide. TheHackerNews.com (April 2017). https:\/\/thehackernews.com\/2017\/04\/vigilante-hacker-iot-botnet_26.html"},{"key":"e_1_3_2_1_19_1","unstructured":"Mohit Kumar. 2017. WireX DDOS botnet: An army of thousands of hacked android smartphones. TheHackerNews.com (August 2017). https:\/\/thehackernews.com\/2017\/08\/android-ddos-botnet.html  Mohit Kumar. 2017. WireX DDOS botnet: An army of thousands of hacked android smartphones. TheHackerNews.com (August 2017). https:\/\/thehackernews.com\/2017\/08\/android-ddos-botnet.html"},{"key":"e_1_3_2_1_20_1","unstructured":"Nile Lars. 2014. Connected Medical Devices Apps: Are They Leading the IoT Revolution or Vice Versa? Wired.com (June 2014). https:\/\/www.wired.com\/insights\/2014\/06\/connected-medical-devices-apps-leading-iot-revolution-vice-versa\/  Nile Lars. 2014. Connected Medical Devices Apps: Are They Leading the IoT Revolution or Vice Versa? Wired.com (June 2014). https:\/\/www.wired.com\/insights\/2014\/06\/connected-medical-devices-apps-leading-iot-revolution-vice-versa\/"},{"key":"e_1_3_2_1_21_1","unstructured":"Kevin Lui. 2017. This 11-year-old just schooled cybersecurity experts by \"weaponizing\" a teddy bear. Fortune.com (May 2017). http:\/\/fortune.com\/2017\/05\/17\/reuben-paul-cybersecurity-hacking\/  Kevin Lui. 2017. This 11-year-old just schooled cybersecurity experts by \"weaponizing\" a teddy bear. Fortune.com (May 2017). http:\/\/fortune.com\/2017\/05\/17\/reuben-paul-cybersecurity-hacking\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687801"},{"key":"e_1_3_2_1_23_1","unstructured":"Andrew Meola. 2016. Internet of Things devices applications & examples. BusinessInsider.com (August 2016). https:\/\/www.businessinsider.com\/internet-of-things-devices-applications-examples-2016-8  Andrew Meola. 2016. Internet of Things devices applications & examples. BusinessInsider.com (August 2016). https:\/\/www.businessinsider.com\/internet-of-things-devices-applications-examples-2016-8"},{"key":"e_1_3_2_1_24_1","unstructured":"Cuong Nguyen. 2016. Linux OS security mechanisms and how to implement them. Helsinki Metropolia University of Applied Sciences (September 2016). https:\/\/www.theseus.fi\/bitstream\/handle\/10024\/118462\/Nguyen_Cuong.pdf?sequence=1  Cuong Nguyen. 2016. Linux OS security mechanisms and how to implement them. Helsinki Metropolia University of Applied Sciences (September 2016). https:\/\/www.theseus.fi\/bitstream\/handle\/10024\/118462\/Nguyen_Cuong.pdf?sequence=1"},{"key":"e_1_3_2_1_25_1","unstructured":"Charlie Osborne. 2016. Our planes are now 'big flying mobile devices' and top hacking targets. ZDNet.com (December 2016). https:\/\/www.zdnet.com\/article\/planes-as-big-flying-mobile-devices-are-top-targets-for-hackers\/  Charlie Osborne. 2016. Our planes are now 'big flying mobile devices' and top hacking targets. ZDNet.com (December 2016). https:\/\/www.zdnet.com\/article\/planes-as-big-flying-mobile-devices-are-top-targets-for-hackers\/"},{"key":"e_1_3_2_1_26_1","unstructured":"Postscapes. 2017. IoT Standards and Protocols. Postscapes.com (2017). https:\/\/www.postscapes.com\/internet-of-things-protocols\/  Postscapes. 2017. IoT Standards and Protocols. Postscapes.com (2017). https:\/\/www.postscapes.com\/internet-of-things-protocols\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2016.7475078"},{"key":"e_1_3_2_1_28_1","unstructured":"Padraig Scully. 2016. 5 Things To Know About The IoT Platform Ecosystem. IoT-Analytics.com (January 2016). https:\/\/iot-analytics.com\/5-things-know-about-iot-platform\/  Padraig Scully. 2016. 5 Things To Know About The IoT Platform Ecosystem. IoT-Analytics.com (January 2016). https:\/\/iot-analytics.com\/5-things-know-about-iot-platform\/"},{"key":"e_1_3_2_1_29_1","unstructured":"Pavitra Shankdhar. 2019. Popular Tools for Brute-force Attacks {Updated for 2019}. InfoSecInstitute.com (February 2019). https:\/\/resources.infosecinstitute.com\/popular-tools-for-brute-force-attacks\/#gref  Pavitra Shankdhar. 2019. Popular Tools for Brute-force Attacks {Updated for 2019}. InfoSecInstitute.com (February 2019). https:\/\/resources.infosecinstitute.com\/popular-tools-for-brute-force-attacks\/#gref"},{"key":"e_1_3_2_1_30_1","unstructured":"Wired Staff. 2017. OK House. Get Smart: Make the Most of Your AI Home Minions. Wired.com (2017). https:\/\/www.wired.com\/2017\/06\/guide-to-ai-artificial-intelligence-at-home\/  Wired Staff. 2017. OK House. Get Smart: Make the Most of Your AI Home Minions. Wired.com (2017). https:\/\/www.wired.com\/2017\/06\/guide-to-ai-artificial-intelligence-at-home\/"},{"volume-title":"International Conference on Financial Cryptography and Data Security","year":"2015","author":"Hyun-Jeen Lee Peter","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","unstructured":"Phillip Tracy. 2017. The top 5 industrial IoT use cases. IBM.com (April 2017). https:\/\/www.ibm.com\/blogs\/internet-of-things\/top-5-industrial-iot-use-cases\/  Phillip Tracy. 2017. The top 5 industrial IoT use cases. IBM.com (April 2017). https:\/\/www.ibm.com\/blogs\/internet-of-things\/top-5-industrial-iot-use-cases\/"},{"key":"e_1_3_2_1_33_1","unstructured":"Zack Whittaker. 2017. Exposed IoT servers let hackers unlock prison cells modify pacemakers. ZDNet.com (July 2017). https:\/\/www.zdnet.com\/article\/exposed-servers-hack-prison-cells-alter-pacemakers\/  Zack Whittaker. 2017. Exposed IoT servers let hackers unlock prison cells modify pacemakers. ZDNet.com (July 2017). https:\/\/www.zdnet.com\/article\/exposed-servers-hack-prison-cells-alter-pacemakers\/"},{"key":"e_1_3_2_1_34_1","unstructured":"Zack Whittaker. 2017. Hundreds of Cisco switches vulnerable to flaw found in WikiLeaks files. ZDNet.com (March 2017). https:\/\/www.zdnet.com\/article\/cisco-warns-of-critical-security-flaw-found-buried-in-wikileaks-vault-7-disclosure\/  Zack Whittaker. 2017. Hundreds of Cisco switches vulnerable to flaw found in WikiLeaks files. ZDNet.com (March 2017). https:\/\/www.zdnet.com\/article\/cisco-warns-of-critical-security-flaw-found-buried-in-wikileaks-vault-7-disclosure\/"},{"key":"e_1_3_2_1_35_1","unstructured":"Guest Writer. 2017. The 5 worst examples of IoT hacking and vulnerabilities in recorded history. IoTForAll.com (May 2017). https:\/\/www.iotforall.com\/5-worst-iot-hacking-vulnerabilities\/  Guest Writer. 2017. The 5 worst examples of IoT hacking and vulnerabilities in recorded history. IoTForAll.com (May 2017). https:\/\/www.iotforall.com\/5-worst-iot-hacking-vulnerabilities\/"}],"event":{"name":"COINS '19: INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS","acronym":"COINS '19","location":"Crete Greece"},"container-title":["Proceedings of the International Conference on Omni-Layer Intelligent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312614.3312615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3312614.3312615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:29Z","timestamp":1750204469000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312614.3312615"}},"subtitle":["IoT Security Enabled by a Blockchain Powered Botnet Vaccine"],"short-title":[],"issued":{"date-parts":[[2019,5,5]]},"references-count":35,"alternative-id":["10.1145\/3312614.3312615","10.1145\/3312614"],"URL":"https:\/\/doi.org\/10.1145\/3312614.3312615","relation":{},"subject":[],"published":{"date-parts":[[2019,5,5]]},"assertion":[{"value":"2019-05-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}