{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T00:48:54Z","timestamp":1774745334703,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384723","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"6-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things"],"prefix":"10.1145","author":[{"given":"Manuel","family":"Huber","sequence":"first","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]},{"given":"Stefan","family":"Hristozov","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]},{"given":"Simon","family":"Ott","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]},{"given":"Vasil","family":"Sarafov","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]},{"given":"Marcus","family":"Peinado","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176337"},{"key":"e_1_3_2_2_2_1","unstructured":"ARM. 2019. AMBA 5 Overview. https:\/\/developer.arm.com\/architectures\/system-architectures\/amba\/amba-5.  ARM. 2019. AMBA 5 Overview. https:\/\/developer.arm.com\/architectures\/system-architectures\/amba\/amba-5."},{"key":"e_1_3_2_2_3_1","unstructured":"ARM Limited. 2017. Introduction to the ARMv8-M architecture.  ARM Limited. 2017. Introduction to the ARMv8-M architecture."},{"key":"e_1_3_2_2_4_1","volume-title":"ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices. ArXiv e-prints (July","author":"Asokan N.","year":"2018"},{"key":"e_1_3_2_2_5_1","volume-title":"Automation Test in Europe Conference Exhibition (DATE). 1154--1159","author":"Auer L.","year":"2019"},{"key":"e_1_3_2_2_6_1","volume-title":"Paladin: Automated detection and containment of rootkit attacks. Department of Computer Science","author":"Baliga Arati","year":"2006"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375894.3375897"},{"key":"e_1_3_2_2_8_1","unstructured":"Credencys. 2019. Increase your Vending Machine's performance efficiency while bringing down the operational expenses & maintenance cost with IoT. https:\/\/www.credencys.com\/smart-vending-machine-iot-solutions\/.  Credencys. 2019. Increase your Vending Machine's performance efficiency while bringing down the operational expenses & maintenance cost with IoT. https:\/\/www.credencys.com\/smart-vending-machine-iot-solutions\/."},{"key":"e_1_3_2_2_9_1","unstructured":"Daimler. 2019. Networked with the surroundings. Car-to-X communication goes into series production. https:\/\/www.daimler.com\/innovation\/case\/connectivity\/car-to-x-2.html.  Daimler. 2019. Networked with the surroundings. Car-to-X communication goes into series production. https:\/\/www.daimler.com\/innovation\/case\/connectivity\/car-to-x-2.html."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"e_1_3_2_2_11_1","unstructured":"Distributed Management Task Force. 2018. Redfish Scalable Platforms Management API Specification v1.5.  Distributed Management Task Force. 2018. Redfish Scalable Platforms Management API Specification v1.5."},{"key":"e_1_3_2_2_12_1","unstructured":"DZone. 2019. Home Automation Using IoT. https:\/\/dzone.com\/articles\/home-automation-using-iot.  DZone. 2019. Home Automation Using IoT. https:\/\/dzone.com\/articles\/home-automation-using-iot."},{"key":"e_1_3_2_2_13_1","unstructured":"Espressif Systems. 2019. ESP8266EX Datasheet.  Espressif Systems. 2019. ESP8266EX Datasheet."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.107"},{"key":"e_1_3_2_2_16_1","volume-title":"Android Developers: Android Things. https:\/\/developer.android.com\/things\/.","year":"2018"},{"key":"e_1_3_2_2_17_1","unstructured":"HardwareBee. 2019. MCU Market History and Forecast 2016--2023. http:\/\/hardwarebee.com\/mcu-market-history-and-forecast-2016--2023\/.  HardwareBee. 2019. MCU Market History and Forecast 2016--2023. http:\/\/hardwarebee.com\/mcu-market-history-and-forecast-2016--2023\/."},{"key":"e_1_3_2_2_18_1","unstructured":"Hilti. 2019. White paper: Introducing Digital Asset Management. https:\/\/www.hilti.com\/content\/dam\/documents\/pdf\/w1\/ontrack\/whitepapers\/W1_US_en_White%20Paper%20Increase%20Profit%20and%20Productivity.pdf.  Hilti. 2019. White paper: Introducing Digital Asset Management. https:\/\/www.hilti.com\/content\/dam\/documents\/pdf\/w1\/ontrack\/whitepapers\/W1_US_en_White%20Paper%20Increase%20Profit%20and%20Productivity.pdf."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.16"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457156"},{"key":"e_1_3_2_2_21_1","unstructured":"Intel Corporation. 2011. Data Center Manageability Interface Specification v1.5 rev. 1.0.  Intel Corporation. 2011. Data Center Manageability Interface Specification v1.5 rev. 1.0."},{"key":"e_1_3_2_2_22_1","unstructured":"Intel Corporation. 2013. Intelligent Platform Management Interface Specification v2.0 rev. 1.1.  Intel Corporation. 2013. Intelligent Platform Management Interface Specification v2.0 rev. 1.1."},{"key":"e_1_3_2_2_23_1","volume-title":"Computer Security -- ESORICS","author":"Stefan Katzenbeisser Florian","year":"2016"},{"key":"e_1_3_2_2_25_1","unstructured":"OpenSystems Media. 2019. IoT Based Smart Traffic Signal Monitoring Using Vehicle Count. https:\/\/www.embedded-computing.com\/guest-blogs\/iot-based-smart-traffic-signal-monitoring-using-vehicle-count.  OpenSystems Media. 2019. IoT Based Smart Traffic Signal Monitoring Using Vehicle Count. https:\/\/www.embedded-computing.com\/guest-blogs\/iot-based-smart-traffic-signal-monitoring-using-vehicle-count."},{"key":"e_1_3_2_2_26_1","unstructured":"Microchip. 2020. CEC1702. https:\/\/www.microchip.com\/wwwproducts\/en\/CEC1702.  Microchip. 2020. CEC1702. https:\/\/www.microchip.com\/wwwproducts\/en\/CEC1702."},{"key":"e_1_3_2_2_27_1","unstructured":"Microsoft Research. 2019. Robust Internet of Things. https:\/\/github.com\/microsoft\/RIoT.  Microsoft Research. 2019. Robust Internet of Things. https:\/\/github.com\/microsoft\/RIoT."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076791"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICED.2016.7804660"},{"key":"e_1_3_2_2_30_1","unstructured":"NetScout. 2019. Mirai IoT Botnet Description and DDoS Attack Mitigation. https:\/\/www.netscout.com\/blog\/asert\/mirai-iot-botnet-description-and-ddos-attack-mitigation.  NetScout. 2019. Mirai IoT Botnet Description and DDoS Attack Mitigation. https:\/\/www.netscout.com\/blog\/asert\/mirai-iot-botnet-description-and-ddos-attack-mitigation."},{"key":"e_1_3_2_2_31_1","unstructured":"NXP. 2019 a. AN12278 - LPC55S69 Security Solutions for IoT.  NXP. 2019 a. AN12278 - LPC55S69 Security Solutions for IoT."},{"key":"e_1_3_2_2_32_1","unstructured":"NXP. 2019 b. LPC55S69-EVK: LPCXpresso55S69 Development Board. https:\/\/www.nxp.com\/products\/processors-and-microcontrollers\/arm-microcontrollers\/general-purpose-mcus\/lpc5500-cortex-m33\/lpcxpresso55s69-development-board:LPC55S69-EVK.  NXP. 2019 b. LPC55S69-EVK: LPCXpresso55S69 Development Board. https:\/\/www.nxp.com\/products\/processors-and-microcontrollers\/arm-microcontrollers\/general-purpose-mcus\/lpc5500-cortex-m33\/lpcxpresso55s69-development-board:LPC55S69-EVK."},{"key":"e_1_3_2_2_33_1","unstructured":"NXP. 2019. LPC55S6x: High Efficiency Arm\u00ae Cortex\u00ae-M33-based Microcontroller Family. https:\/\/www.nxp.com\/products\/processors-and-microcontrollers\/arm-microcontrollers\/general-purpose-mcus\/lpc5500-cortex-m33\/high-efficiency-arm-cortex-m33-based-microcontroller-family:LPC55S6x.  NXP. 2019. LPC55S6x: High Efficiency Arm\u00ae Cortex\u00ae-M33-based Microcontroller Family. https:\/\/www.nxp.com\/products\/processors-and-microcontrollers\/arm-microcontrollers\/general-purpose-mcus\/lpc5500-cortex-m33\/high-efficiency-arm-cortex-m33-based-microcontroller-family:LPC55S6x."},{"key":"e_1_3_2_2_34_1","unstructured":"NXP. 2019 a. LPC55Sxx Secure Boot. https:\/\/www.nxp.com\/docs\/en\/application-note\/AN12283.pdf.  NXP. 2019 a. LPC55Sxx Secure Boot. https:\/\/www.nxp.com\/docs\/en\/application-note\/AN12283.pdf."},{"key":"e_1_3_2_2_35_1","unstructured":"NXP. 2019 b. UM11126 LPC55S6x\/LPC55S2x\/LPC552x User manual.  NXP. 2019 b. UM11126 LPC55S6x\/LPC55S2x\/LPC552x User manual."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888881.1888931"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","volume-title":"Wireless sensor networks","author":"Raghavendra Cauligi S","DOI":"10.1007\/b117506"},{"key":"e_1_3_2_2_38_1","unstructured":"Arjmand Sanuel. 2017. Azure IoT supports new security hardware to strengthen IoT security. https:\/\/azure.microsoft.com\/en-us\/blog\/azure-iot-supports-new-security-hardware-to-strengthen-iot-security\/.  Arjmand Sanuel. 2017. Azure IoT supports new security hardware to strengthen IoT security. https:\/\/azure.microsoft.com\/en-us\/blog\/azure-iot-supports-new-security-hardware-to-strengthen-iot-security\/."},{"key":"e_1_3_2_2_39_1","unstructured":"Amazon Web Services. 2019. freeRTOS. https:\/\/www.freertos.org\/.  Amazon Web Services. 2019. freeRTOS. https:\/\/www.freertos.org\/."},{"key":"e_1_3_2_2_40_1","unstructured":"Arvind Seshadri Mark Luk Adrian Perrig Leendert van Doorn and Pradeep Khosla. 2004. Using FIRE & ICE for Detecting and Recovering Compromised Nodes in Sensor Networks.  Arvind Seshadri Mark Luk Adrian Perrig Leendert van Doorn and Pradeep Khosla. 2004. Using FIRE & ICE for Detecting and Recovering Compromised Nodes in Sensor Networks."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"e_1_3_2_2_42_1","unstructured":"Sigfox. 2019. Smart livestock collars let ranchers track monitor and manage herds like never before. https:\/\/www.sigfox.com\/en\/solutions\/smart-livestock-collars-let-ranchers-track-monitor-and-manage-herds-never.  Sigfox. 2019. Smart livestock collars let ranchers track monitor and manage herds like never before. https:\/\/www.sigfox.com\/en\/solutions\/smart-livestock-collars-let-ranchers-track-monitor-and-manage-herds-never."},{"key":"e_1_3_2_2_43_1","unstructured":"Symantec. 2016. Internet Security Threat Report.  Symantec. 2016. Internet Security Threat Report."},{"key":"e_1_3_2_2_44_1","unstructured":"Symantec. 2019. Hajime worm battles Mirai for control of the Internet of Things. https:\/\/www.symantec.com\/connect\/blogs\/hajime-worm-battles-mirai-control-internet-things.  Symantec. 2019. Hajime worm battles Mirai for control of the Internet of Things. https:\/\/www.symantec.com\/connect\/blogs\/hajime-worm-battles-mirai-control-internet-things."},{"key":"e_1_3_2_2_45_1","unstructured":"TC Group and others. 2011. TPM Main Specification Version 1.2 Rev. 116. https:\/\/trustedcomputinggroup.org\/resource\/tpm-main-specification\/.  TC Group and others. 2011. TPM Main Specification Version 1.2 Rev. 116. https:\/\/trustedcomputinggroup.org\/resource\/tpm-main-specification\/."},{"key":"e_1_3_2_2_46_1","volume-title":"GANGRENE: Exploring the Mortality of Flash Memory. In Presented as part of the 7th USENIX Workshop on Hot Topics in Security","author":"Templeman R.","year":"2012"},{"key":"e_1_3_2_2_47_1","unstructured":"Terry Yin. 2019. A simple code complexity analyzer without caring about the C\/C+ header files or Java imports. https:\/\/terryyin.github.io\/lizard\/.  Terry Yin. 2019. A simple code complexity analyzer without caring about the C\/C+ header files or Java imports. https:\/\/terryyin.github.io\/lizard\/."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1210669.1210670"},{"key":"e_1_3_2_2_49_1","unstructured":"Trusted Computing Group. 2017. Foundational Trust for IoT and Resource Constrained Devices.  Trusted Computing Group. 2017. Foundational Trust for IoT and Resource Constrained Devices."},{"key":"e_1_3_2_2_50_1","unstructured":"Trusted Computing Group. 2018a. Hardware Requirements for a Device Identifier Composition Engine.  Trusted Computing Group. 2018a. Hardware Requirements for a Device Identifier Composition Engine."},{"key":"e_1_3_2_2_51_1","unstructured":"Trusted Computing Group. 2018b. Implicit Identity Based Device Attestation.  Trusted Computing Group. 2018b. Implicit Identity Based Device Attestation."},{"key":"e_1_3_2_2_52_1","unstructured":"Trusted Computing Group. 2019. TCG Cyber Resilient Technologies. https:\/\/trustedcomputinggroup.org\/wp-content\/uploads\/TCG-Cyber-Resilient-Technologies-%E2%80%93-Rob-Spiger-Microsoft.pdf.  Trusted Computing Group. 2019. TCG Cyber Resilient Technologies. https:\/\/trustedcomputinggroup.org\/wp-content\/uploads\/TCG-Cyber-Resilient-Technologies-%E2%80%93-Rob-Spiger-Microsoft.pdf."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004904"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00084"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"ASIA CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384723","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:27Z","timestamp":1750200087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":52,"alternative-id":["10.1145\/3320269.3384723","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384723","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}