{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:24Z","timestamp":1750220844940,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,14]]},"DOI":"10.1145\/3360664.3360670","type":"proceedings-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T15:44:57Z","timestamp":1571845497000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Achieving Consistency of Software Updates against Strong Attackers"],"prefix":"10.1145","author":[{"given":"Lamya","family":"Abdullah","sequence":"first","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Uniscon GmbH, Germany"}]},{"given":"Sebastian","family":"Hahn","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Germany"}]},{"given":"Felix","family":"Freiling","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Debian Policy Manual. https:\/\/www.debian.org\/doc\/debian-policy\/. Accessed: 2017-12-26. 2017. Debian Policy Manual. https:\/\/www.debian.org\/doc\/debian-policy\/. Accessed: 2017-12-26."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"2017. Rust. https:\/\/www.rust-lang.org. Accessed: 2017-11-23. 2017. Rust. https:\/\/www.rust-lang.org. Accessed: 2017-11-23.","DOI":"10.1515\/9781772123180-009"},{"key":"e_1_3_2_1_3_1","unstructured":"2019. ShadowHammer: Malicious updates for ASUS laptops. https:\/\/www.kaspersky.com\/blog\/shadow-hammer-teaser\/26149\/. Accessed: 2019-04-29. 2019. ShadowHammer: Malicious updates for ASUS laptops. https:\/\/www.kaspersky.com\/blog\/shadow-hammer-teaser\/26149\/. Accessed: 2019-04-29."},{"volume-title":"Concurrency Control and Recovery in Database Systems","author":"Bernstein Philip A.","key":"e_1_3_2_1_4_1","unstructured":"Philip A. Bernstein , Vassos Hadzilacos , and Nathan Goodman . 1987. Concurrency Control and Recovery in Database Systems . Addison-Wesley . http:\/\/research.microsoft.com\/en-us\/people\/philbe\/ccontrol.aspx Philip A. Bernstein, Vassos Hadzilacos, and Nathan Goodman. 1987. Concurrency Control and Recovery in Database Systems. Addison-Wesley. http:\/\/research.microsoft.com\/en-us\/people\/philbe\/ccontrol.aspx"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660311"},{"key":"e_1_3_2_1_8_1","volume-title":"How the NSA plans to infect \u00e2\u0102&Yuml;millions\u00e2\u0102&Zacute","author":"Gallagher Ryan","year":"2014","unstructured":"Ryan Gallagher and Glenn Greenwald . 2014. How the NSA plans to infect \u00e2\u0102&Yuml;millions\u00e2\u0102&Zacute ; of computers with malware. The Intercept 12 ( 2014 ). Ryan Gallagher and Glenn Greenwald. 2014. How the NSA plans to infect \u00e2\u0102&Yuml;millions\u00e2\u0102&Zacute; of computers with malware. The Intercept 12 (2014)."},{"key":"e_1_3_2_1_9_1","volume-title":"Managing Identities Using Blockchains and CoSi. In 9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs","author":"Kokoris-Kogias Lefteris","year":"2016","unstructured":"Lefteris Kokoris-Kogias , Linus Gasser , Ismail Khoffi , Philipp Jovanovic , Nicolas Gailly , and Bryan Ford . 2016 . Managing Identities Using Blockchains and CoSi. In 9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016). Lefteris Kokoris-Kogias, Linus Gasser, Ismail Khoffi, Philipp Jovanovic, Nicolas Gailly, and Bryan Ford. 2016. Managing Identities Using Blockchains and CoSi. In 9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Ben Laurie Adam Langley and Emilia Kasper. 2013. Certificate transparency. Technical Report. RFC Editor. Ben Laurie Adam Langley and Emilia Kasper. 2013. Certificate transparency. Technical Report. RFC Editor.","DOI":"10.17487\/rfc6962"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.001"},{"key":"e_1_3_2_1_13_1","volume-title":"RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings. 426--446","author":"Nayak Kartik","year":"2014","unstructured":"Kartik Nayak , Daniel Marino , Petros Efstathopoulos , and Tudor Dumitras . 2014 . Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild. In Research in Attacks, Intrusions and Defenses - 17th International Symposium , RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings. 426--446 . Kartik Nayak, Daniel Marino, Petros Efstathopoulos, and Tudor Dumitras. 2014. Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild. In Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings. 426--446."},{"key":"e_1_3_2_1_14_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Nikitin Kirill","year":"2017","unstructured":"Kirill Nikitin , Eleftherios Kokoris-Kogias , Philipp Jovanovic , Nicolas Gailly , Linus Gasser , Ismail Khoffi , Justin Cappos , and Bryan Ford . 2017 . CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds . In 26th USENIX Security Symposium (USENIX Security 17) . Vancouver, BC, 1271--1287. Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, and Bryan Ford. 2017. CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. In 26th USENIX Security Symposium (USENIX Security 17). Vancouver, BC, 1271--1287."},{"key":"e_1_3_2_1_15_1","volume-title":"Fox-IT","author":"Ronald Prins J","year":"2011","unstructured":"J Ronald Prins and Business Unit Cybercrime . 2011 . DigiNotar Certificate Authority breach \u00e2\u0102IJOperation Black Tulip\u00e2\u0102\u0130 . Fox-IT , November (2011). J Ronald Prins and Business Unit Cybercrime. 2011. DigiNotar Certificate Authority breach \u00e2\u0102IJOperation Black Tulip\u00e2\u0102\u0130. Fox-IT, November (2011)."},{"key":"e_1_3_2_1_16_1","volume-title":"David Isaac Wolinsky, and Bryan Ford","author":"Syta Ewa","year":"2015","unstructured":"Ewa Syta , Iulia Tamas , Dylan Visher , David Isaac Wolinsky, and Bryan Ford . 2015 . Decentralizing authorities into scalable strongest-link cothorities. CoRR , abs\/1503.08768 (2015). Ewa Syta, Iulia Tamas, Dylan Visher, David Isaac Wolinsky, and Bryan Ford. 2015. Decentralizing authorities into scalable strongest-link cothorities. CoRR, abs\/1503.08768 (2015)."},{"key":"e_1_3_2_1_17_1","unstructured":"The Intercept. 2017. I Hunt Sys Admins. https:\/\/theintercept.com\/document\/2014\/03\/20\/hunt-sys-admins\/. Accessed: 2017-12-26. The Intercept. 2017. I Hunt Sys Admins. https:\/\/theintercept.com\/document\/2014\/03\/20\/hunt-sys-admins\/. Accessed: 2017-12-26."},{"key":"e_1_3_2_1_18_1","unstructured":"The Update Framework Project. 2017. https:\/\/theupdateframework.github.io. Accessed: 2017-11-15. The Update Framework Project. 2017. https:\/\/theupdateframework.github.io. Accessed: 2017-11-15."},{"key":"e_1_3_2_1_19_1","volume-title":"ORDER COMPELLING Apple","author":"United States District Court. 2016.","year":"2017","unstructured":"United States District Court. 2016. ORDER COMPELLING Apple , Inc. TO ASSIST AGENTS IN SEARCH. https:\/\/cdn2.vox-cdn.com\/uploads\/chorus_asset\/file\/6053155\/in-the-matter-of-the-search.0.pdf. Accessed : 2017 -12-26. United States District Court. 2016. ORDER COMPELLING Apple, Inc. TO ASSIST AGENTS IN SEARCH. https:\/\/cdn2.vox-cdn.com\/uploads\/chorus_asset\/file\/6053155\/in-the-matter-of-the-search.0.pdf. Accessed: 2017-12-26."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/210308.210315"}],"event":{"name":"CECC 2019: Central European Cybersecurity Conference","sponsor":["University of Maribor"],"location":"Munich Germany","acronym":"CECC 2019"},"container-title":["Proceedings of the Third Central European Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360664.3360670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:00Z","timestamp":1750202580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":20,"alternative-id":["10.1145\/3360664.3360670","10.1145\/3360664"],"URL":"https:\/\/doi.org\/10.1145\/3360664.3360670","relation":{},"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"2019-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}