{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:02Z","timestamp":1750220882628,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3340102","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["HEHLKAPPE"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Aigner","sequence":"first","affiliation":[{"name":"University of Applied Sciences Upper Austria, Secure Information Systems, Hagenberg, Austria"}]},{"given":"Rene","family":"Zeller","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Upper Austria, Secure Information Systems, Hagenberg, Austria"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. CVE-2018-6408. Available from MITRE CVE-ID CVE-2018-6408. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-6408  2018. CVE-2018-6408. Available from MITRE CVE-ID CVE-2018-6408. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-6408"},{"volume-title":"Brugioni","year":"2000","author":"Cohen Eliot A.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg S. Corrado Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Ian Goodfellow Andrew Harp Geoffrey Irving Michael Isard Yangqing Jia Rafal Jozefowicz Lukasz Kaiser Manjunath Kudlur Josh Levenberg Dan Man\u00e9 Rajat Monga Sherry Moore Derek Murray Chris Olah Mike Schuster Jonathon Shlens Benoit Steiner Ilya Sutskever Kunal Talwar Paul Tucker Vincent Vanhoucke Vijay Vasudevan Fernanda Vi\u00e9gas Oriol Vinyals Pete Warden Martin Wattenberg Martin Wicke Yuan Yu and Xiaoqiang Zheng. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/ Software available from tensorflow.org.  Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg S. Corrado Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Ian Goodfellow Andrew Harp Geoffrey Irving Michael Isard Yangqing Jia Rafal Jozefowicz Lukasz Kaiser Manjunath Kudlur Josh Levenberg Dan Man\u00e9 Rajat Monga Sherry Moore Derek Murray Chris Olah Mike Schuster Jonathon Shlens Benoit Steiner Ilya Sutskever Kunal Talwar Paul Tucker Vincent Vanhoucke Vijay Vasudevan Fernanda Vi\u00e9gas Oriol Vinyals Pete Warden Martin Wattenberg Martin Wicke Yuan Yu and Xiaoqiang Zheng. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/ Software available from tensorflow.org."},{"key":"e_1_3_2_1_4_1","unstructured":"Alexander Aigner J. Seyr W. Leitner and A. Greul. 2015. peinjector - MITM PE file infector. https:\/\/github.com\/JonDoNym\/peinjector  Alexander Aigner J. Seyr W. Leitner and A. Greul. 2015. peinjector - MITM PE file infector. https:\/\/github.com\/JonDoNym\/peinjector"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.08.017"},{"volume-title":"Deep Structured Energy-Based Image Inpainting. 2018 24th International Conference on Pattern Recognition (ICPR)","year":"2018","author":"Altinel Fazil","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3711"},{"volume-title":"Goodfellow","year":"2016","author":"Bengio Yoshua","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Tyler Elliot) Bettilyon. 2018. Deep Fakes and The Future of Propaganda. https:\/\/medium.com\/@TebbaVonMathenstien\/deep-fakes-and-the-future-of-propaganda-18a257026571  Tyler Elliot) Bettilyon. 2018. Deep Fakes and The Future of Propaganda. https:\/\/medium.com\/@TebbaVonMathenstien\/deep-fakes-and-the-future-of-propaganda-18a257026571"},{"volume-title":"The OpenCV Library. Dr. Dobb's Journal of Software Tools","year":"2000","author":"Bradski G.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"byt3bl33d3rl (pseud.). 2015. MITMf - Framework for Man-In-The-Middle attacks. https:\/\/github.com\/byt3bl33d3r\/MITMf  byt3bl33d3rl (pseud.). 2015. MITMf - Framework for Man-In-The-Middle attacks. https:\/\/github.com\/byt3bl33d3r\/MITMf"},{"volume-title":"Deep Learning for Multiple Object Tracking: A Survey. IET Computer Vision (01","year":"2019","author":"Chen Shengyong","key":"e_1_3_2_1_12_1"},{"volume-title":"Deep Fakes: A Looming Crisis for National Security, Democracy and Privacy? https:\/\/www.lawfareblog.com\/deep-fakes-looming-crisis-national-security-democracy-and-privacy","year":"2018","author":"Chesney Robert","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2548426"},{"key":"e_1_3_2_1_15_1","unstructured":"Aldo Cortesi Maximilian Hils and Thomas Kriechbaumer. 2010. mitmproxy: A free and open source interactive HTTPS proxy. https:\/\/mitmproxy.org\/  Aldo Cortesi Maximilian Hils and Thomas Kriechbaumer. 2010. mitmproxy: A free and open source interactive HTTPS proxy. https:\/\/mitmproxy.org\/"},{"volume-title":"Australian Information Security Management Conference. 25--32","year":"2017","author":"Cusack B","key":"e_1_3_2_1_16_1"},{"volume-title":"\u00dcnal","year":"2018","author":"Demir Ugur","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"Foscam. 2019. What is the process to upgrade the firmware of a Foscam SD camera? https:\/\/www.foscam.com\/faqs\/view.html?id=57  Foscam. 2019. What is the process to upgrade the firmware of a Foscam SD camera? https:\/\/www.foscam.com\/faqs\/view.html?id=57"},{"volume-title":"Entertainment Computing -- ICEC","year":"2018","author":"Gomez Javier","key":"e_1_3_2_1_19_1"},{"volume-title":"Advances in Neural Information Processing Systems 27","author":"Goodfellow Ian","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","unstructured":"Google Brain Team. 2019. Performance | TensorFlow. https:\/\/www.tensorflow.org\/guide\/performance\/overview  Google Brain Team. 2019. Performance | TensorFlow. https:\/\/www.tensorflow.org\/guide\/performance\/overview"},{"volume-title":"Deepfake Video Detection Using Recurrent Neural Networks. In IEEE International Conference on Advanced Video and Signal-based Surveillance (to appear).","year":"2018","author":"G\u00fcera David","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"A. Guzman and A. Gupta. 2017. IoT Penetration Testing Cookbook: Identify vulnerabilities and secure your smart devices. Packt Publishing.   A. Guzman and A. Gupta. 2017. IoT Penetration Testing Cookbook: Identify vulnerabilities and secure your smart devices. Packt Publishing."},{"volume-title":"Mask R-CNN. Proceedings of the IEEE International Conference on Computer Vision 2017-Octob","year":"2017","author":"He Kaiming","key":"e_1_3_2_1_24_1"},{"volume-title":"Deep Residual Learning for Image Recognition. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","year":"2016","author":"He Kaiming","key":"e_1_3_2_1_25_1"},{"volume-title":"Standard","author":"IEC","key":"e_1_3_2_1_26_1"},{"volume-title":"Lois de distribution florale dans la zone alpine. Bulletin de la Soci\u00e9t\u00e9 vaudoise des sciences naturelles 38 (01","year":"1902","author":"Jaccard Paul","key":"e_1_3_2_1_27_1"},{"volume-title":"Proceedings 35th International System Safety Conference. http:\/\/eprints.gla.ac.uk\/150355\/","year":"2017","author":"Johnson Chris W.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"Sanchit Khera. 2018. How 'deep fakes' can have an adverse impact on the way we consume online content. https:\/\/www.thenewsminute.com\/article\/how-deep-fakes-can-have-adverse-impact-way-we-consume-online-content-78640  Sanchit Khera. 2018. How 'deep fakes' can have an adverse impact on the way we consume online content. https:\/\/www.thenewsminute.com\/article\/how-deep-fakes-can-have-adverse-impact-way-we-consume-online-content-78640"},{"key":"e_1_3_2_1_30_1","unstructured":"Pierre Kim. 2017. Multiple vulnerabilities found in Wireless IP Camera (P2P) WIFICAM cameras and vulnerabilities in custom http server. https:\/\/pierrekim.github.io\/blog\/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead  Pierre Kim. 2017. Multiple vulnerabilities found in Wireless IP Camera (P2P) WIFICAM cameras and vulnerabilities in custom http server. https:\/\/pierrekim.github.io\/blog\/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead"},{"key":"e_1_3_2_1_31_1","unstructured":"Joel King. 2009. Cisco IP Video Surveillance Design Guide. 243 pages.  Joel King. 2009. Cisco IP Video Surveillance Design Guide. 243 pages."},{"volume-title":"2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC). 411--418","author":"Krebs S.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","unstructured":"Tsung-Yi Lin Michael Maire Serge J. Belongie Lubomir D. Bourdev Ross B. Girshick James Hays Pietro Perona Deva Ramanan Piotr Doll\u00e1r and C. Lawrence Zitnick. 2014. Microsoft COCO: Common Objects in Context. In ECCV.  Tsung-Yi Lin Michael Maire Serge J. Belongie Lubomir D. Bourdev Ross B. Girshick James Hays Pietro Perona Deva Ramanan Piotr Doll\u00e1r and C. Lawrence Zitnick. 2014. Microsoft COCO: Common Objects in Context. In ECCV."},{"key":"e_1_3_2_1_34_1","unstructured":"Teena Maddox. 2018. Why deepfakes are a real threat to elections and society. https:\/\/www.techrepublic.com\/article\/why-deepfakes-are-a-real-threat-to-elections-and-society\/  Teena Maddox. 2018. Why deepfakes are a real threat to elections and society. https:\/\/www.techrepublic.com\/article\/why-deepfakes-are-a-real-threat-to-elections-and-society\/"},{"key":"e_1_3_2_1_35_1","unstructured":"Scott Mccloskey Michael Albright and Honeywell Acst. 2018. Detecting GAN-generated Imagery using Color Cues. (2018). arXiv:1812.08247v1 https:\/\/arxiv.org\/pdf\/1812.08247.pdf  Scott Mccloskey Michael Albright and Honeywell Acst. 2018. Detecting GAN-generated Imagery using Color Cues. (2018). arXiv:1812.08247v1 https:\/\/arxiv.org\/pdf\/1812.08247.pdf"},{"key":"e_1_3_2_1_36_1","unstructured":"Dave Mihalovic. 2018. The Implications of Advanced AI and DeepFakes. https:\/\/www.pm360online.com\/the-implications-of-advanced-ai-and-deepfake\/  Dave Mihalovic. 2018. The Implications of Advanced AI and DeepFakes. https:\/\/www.pm360online.com\/the-implications-of-advanced-ai-and-deepfake\/"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Jan Newmarch. 2017. GStreamer. Apress Berkeley CA 211--221.  Jan Newmarch. 2017. GStreamer. Apress Berkeley CA 211--221.","DOI":"10.1007\/978-1-4842-2496-0_10"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230863"},{"key":"e_1_3_2_1_39_1","unstructured":"Jeong Wook Oh. 2014. Reverse Engineering Flash Memory for Fun and Benefit. https:\/\/www.blackhat.com\/docs\/us-14\/materials\/us-14-Oh-Reverse-Engineering-Flash-Memory-For-Fun-And-Benefit-WP.pdf  Jeong Wook Oh. 2014. Reverse Engineering Flash Memory for Fun and Benefit. https:\/\/www.blackhat.com\/docs\/us-14\/materials\/us-14-Oh-Reverse-Engineering-Flash-Memory-For-Fun-And-Benefit-WP.pdf"},{"key":"e_1_3_2_1_40_1","unstructured":"Open Web Application Security Project. {n. d.}.  Open Web Application Security Project. {n. d.}."},{"key":"e_1_3_2_1_41_1","unstructured":"Joshua Pitts. 2015. The Backdoor Factory Proxy (BDFProxy). https:\/\/github.com\/secretsquirrel\/BDFProxy  Joshua Pitts. 2015. The Backdoor Factory Proxy (BDFProxy). https:\/\/github.com\/secretsquirrel\/BDFProxy"},{"key":"e_1_3_2_1_42_1","unstructured":"Deepfake (pseud.). 2017. \/r\/deepfakes. https:\/\/www.reddit.com\/r\/deepfakes  Deepfake (pseud.). 2017. \/r\/deepfakes. https:\/\/www.reddit.com\/r\/deepfakes"},{"key":"e_1_3_2_1_43_1","unstructured":"Oleg Puzanov. 2017. Faleemi FSC-880 Multiple Security Vulnerabilities. CVE-2017--14743.https:\/\/medium.com\/iotsploit\/faleemi-fsc-880-multiple-security-vulnerabilities-ed1d132c2cce  Oleg Puzanov. 2017. Faleemi FSC-880 Multiple Security Vulnerabilities. CVE-2017--14743.https:\/\/medium.com\/iotsploit\/faleemi-fsc-880-multiple-security-vulnerabilities-ed1d132c2cce"},{"volume-title":"Real-Time Object Detection.","year":"2015","author":"Redmon Joseph","key":"e_1_3_2_1_44_1"},{"volume-title":"Faster, Stronger.","year":"2016","author":"Redmon Joseph","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","unstructured":"Joseph Redmon Ali Farhadi and Coco Ap. 2018. YOLOv3: An Incremental Improvement. (2018). arXiv:1612.08242 https:\/\/arxiv.org\/abs\/1804.02767  Joseph Redmon Ali Farhadi and Coco Ap. 2018. YOLOv3: An Incremental Improvement. (2018). arXiv:1612.08242 https:\/\/arxiv.org\/abs\/1804.02767"},{"key":"e_1_3_2_1_47_1","first-page":"2","article-title":"The Watershed Transform","volume":"41","author":"Roerdink Jos B.T.M.","year":"2000","journal-title":"Definitions, Algorithms and Parallelization Strategies. Fundam. Inf."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186562.1015720"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3550"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"H. Schulzrinne A. Rao R. Lanphier M. Westerlund and M. Stiemerling. 2016. Real-Time Streaming Protocol Version 2.0. RFC 7826. RFC Editor.  H. Schulzrinne A. Rao R. Lanphier M. Westerlund and M. Stiemerling. 2016. Real-Time Streaming Protocol Version 2.0. RFC 7826. RFC Editor.","DOI":"10.17487\/RFC7826"},{"volume-title":"International Conference on Advanced Communication Technology, ICACT.","year":"2018","author":"Seralathan Yogeesh","key":"e_1_3_2_1_51_1"},{"volume-title":"Detection and Disposal of Improvised Explosives","key":"e_1_3_2_1_52_1"},{"key":"e_1_3_2_1_53_1","unstructured":"K. Sreedhar and B. Panlal. 2012. Enhancement of Images using Morphological Transformation. CoRR abs\/1203.2514 (2012).  K. Sreedhar and B. Panlal. 2012. Enhancement of Images using Morphological Transformation. CoRR abs\/1203.2514 (2012)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2015.7288421"},{"key":"e_1_3_2_1_55_1","unstructured":"T. Ylonen and C. Lonvick. 2006. The Secure Shell (SSH) Transport Layer Protocol. RFC 4253. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc4253.txt http:\/\/www.rfc-editor.org\/rfc\/rfc4253.txt.  T. Ylonen and C. Lonvick. 2006. The Secure Shell (SSH) Transport Layer Protocol. RFC 4253. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc4253.txt http:\/\/www.rfc-editor.org\/rfc\/rfc4253.txt."},{"key":"e_1_3_2_1_56_1","unstructured":"Sagi Zeevi. 2016. Fastest background subtraction is Background-SubtractorCNT. https:\/\/www.theimpossiblecode.com\/blog\/fastest-background-subtraction-opencv\/  Sagi Zeevi. 2016. Fastest background subtraction is Background-SubtractorCNT. https:\/\/www.theimpossiblecode.com\/blog\/fastest-background-subtraction-opencv\/"},{"volume-title":"Shou tao Xu, and Xindong Wu","year":"2018","author":"Zhao Zhong-Qiu","key":"e_1_3_2_1_57_1"},{"volume-title":"Learning Deep Features for Scene Recognition using Places Database. Advances in Neural Information Processing Systems 1 (05","year":"2015","author":"Zhou Bolei","key":"e_1_3_2_1_58_1"},{"volume-title":"Generative Visual Manipulation on the Natural. European Conference on Computer Vision 1","year":"2016","author":"Kr\u00e4henb\u00fchl Philipp","key":"e_1_3_2_1_59_1"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340102","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3340102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340102"}},"subtitle":["Utilizing Deep Learning to Manipulate Surveillance Camera Footage in Real-Time"],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":59,"alternative-id":["10.1145\/3339252.3340102","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3340102","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}