{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:40:03Z","timestamp":1750196403044,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Eurostars","award":["E11897"],"award-info":[{"award-number":["E11897"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,25]]},"DOI":"10.1145\/3407023.3407075","type":"proceedings-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T16:32:52Z","timestamp":1596126772000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["RESCURE"],"prefix":"10.1145","author":[{"given":"Georgios","family":"Selimis","sequence":"first","affiliation":[{"name":"Intrinsic ID, Eindhoven, Netherlands"}]},{"given":"Rui","family":"Wang","sequence":"additional","affiliation":[{"name":"Intrinsic ID, Eindhoven, Netherlands"}]},{"given":"Roel","family":"Maes","sequence":"additional","affiliation":[{"name":"Intrinsic ID, Eindhoven, Netherlands"}]},{"given":"Geert-Jan","family":"Schrijen","sequence":"additional","affiliation":[{"name":"Intrinsic ID, Eindhoven, Netherlands"}]},{"given":"Mario","family":"M\u00fcnzer","sequence":"additional","affiliation":[{"name":"Technikon Forschungs- und Planungsgesellschaft mbH, Villach, Austria"}]},{"given":"Stefan","family":"Ili\u0107","sequence":"additional","affiliation":[{"name":"Technikon Forschungs- und Planungsgesellschaft mbH, Villach, Austria"}]},{"given":"Frans M. J.","family":"Willems","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, Netherlands"}]},{"given":"Lieneke","family":"Kusters","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon. [n.d.]. Amazon. https:\/\/www.amazon.com  Amazon. [n.d.]. Amazon. https:\/\/www.amazon.com"},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. [n.d.]. Amazon FreeRTOS. https:\/\/github.com\/aws\/amazon-freertos  Amazon. [n.d.]. Amazon FreeRTOS. https:\/\/github.com\/aws\/amazon-freertos"},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon. [n.d.]. AWS IoT SDK Python v2. https:\/\/github.com\/aws\/aws-iot-device-sdk-python-v2  Amazon. [n.d.]. AWS IoT SDK Python v2. https:\/\/github.com\/aws\/aws-iot-device-sdk-python-v2"},{"volume-title":"Smart Sensors at the IoT Frontier","author":"Arias Orlando","key":"e_1_3_2_1_5_1","unstructured":"Orlando Arias , Kelvin Ly , and Yier Jin . 2017. Security and privacy in IoT era . In Smart Sensors at the IoT Frontier . Springer , 351--378. Orlando Arias, Kelvin Ly, and Yier Jin. 2017. Security and privacy in IoT era. In Smart Sensors at the IoT Frontier. Springer, 351--378."},{"key":"e_1_3_2_1_6_1","volume-title":"Retrieved","author":"ARM.","year":"2020","unstructured":"ARM. 2020 . TrustZone . Retrieved April 03, 2020 from https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone ARM. 2020. TrustZone. Retrieved April 03, 2020 from https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone"},{"key":"e_1_3_2_1_7_1","unstructured":"ARMmbed. [n.d.]. mbedtls. https:\/\/github.com\/ARMmbed\/mbedtls  ARMmbed. [n.d.]. mbedtls. https:\/\/github.com\/ARMmbed\/mbedtls"},{"key":"e_1_3_2_1_8_1","unstructured":"boto. [n.d.]. boto3. https:\/\/github.com\/boto\/boto3  boto. [n.d.]. boto3. https:\/\/github.com\/boto\/boto3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2014.2370531"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"e_1_3_2_1_11_1","unstructured":"Google. [n.d.]. Google. https:\/\/www.google.com  Google. [n.d.]. Google. https:\/\/www.google.com"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"J. Guajardo S. S. Kumar G. Schrijen and P. Tuyls. 2007. FPGA Intrinsic PUFs and Their Use for IP Protection. In Cryptographic Hardware Embedded Syst. - CHES. 63--80.  J. Guajardo S. S. Kumar G. Schrijen and P. Tuyls. 2007. FPGA Intrinsic PUFs and Their Use for IP Protection. In Cryptographic Hardware Embedded Syst. - CHES. 63--80.","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","author":"IBM.","year":"2020","unstructured":"IBM. 2020 . Top 10 IoT security challenges . Retrieved March 19, 2020 from https:\/\/developer.ibm.com\/technologies\/iot\/articles\/iot-top-10-iot-security-challenges\/ IBM. 2020. Top 10 IoT security challenges. Retrieved March 19, 2020 from https:\/\/developer.ibm.com\/technologies\/iot\/articles\/iot-top-10-iot-security-challenges\/"},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"INTRINSIC","year":"2018","unstructured":"INTRINSIC ID. 2018 . Flexible Key Provisioning . Retrieved April 03, 2020 from http:\/\/go.intrinsic-id.com\/flexible-key-provisioning-sram-puf-lp INTRINSIC ID. 2018. Flexible Key Provisioning. Retrieved April 03, 2020 from http:\/\/go.intrinsic-id.com\/flexible-key-provisioning-sram-puf-lp"},{"key":"e_1_3_2_1_16_1","unstructured":"Intel. 2020. Tinycrypt. https:\/\/github.com\/intel\/tinycrypt  Intel. 2020. Tinycrypt. https:\/\/github.com\/intel\/tinycrypt"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_17_1","unstructured":"iot eclipse. 2020 . IoT developer survey 2019 . Retrieved March 19, 2020 from https:\/\/drive.google.com\/file\/d\/17WEobD5Etfw5JnoKC1g4IME_XCtPNGGc\/view iot eclipse. 2020. IoT developer survey 2019. Retrieved March 19, 2020 from https:\/\/drive.google.com\/file\/d\/17WEobD5Etfw5JnoKC1g4IME_XCtPNGGc\/view"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/isit.2017.8006840"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035094"},{"key":"e_1_3_2_1_20_1","volume-title":"2019 - Early access. Secret-Key Capacity Regions for Multiple Enrollments with an SRAM-PUF","author":"Kusters L.","year":"2019","unstructured":"L. Kusters and F. M. J. Willems . 2019 - Early access. Secret-Key Capacity Regions for Multiple Enrollments with an SRAM-PUF . IEEE Trans. on Inform. Forensics and Security ( 2019 - Early access). L. Kusters and F. M. J. Willems. 2019 - Early access. Secret-Key Capacity Regions for Multiple Enrollments with an SRAM-PUF. IEEE Trans. on Inform. Forensics and Security (2019 - Early access)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_5"},{"volume-title":"IEEE International Symposium on Information Theory.","author":"Maes R.","key":"e_1_3_2_1_22_1","unstructured":"R. Maes , P. Tuyls , and I. Verbauwhede . 2009. A soft decision helper data algorithm for SRAM PUFs . In IEEE International Symposium on Information Theory. R. Maes, P. Tuyls, and I. Verbauwhede. 2009. A soft decision helper data algorithm for SRAM PUFs. In IEEE International Symposium on Information Theory."},{"volume-title":"Towards Hardware-Intrinsic Security","author":"Maes Roel","key":"e_1_3_2_1_23_1","unstructured":"Roel Maes and Ingrid Verbauwhede . 2010. Physically unclonable functions: A study on the state of the art and future research directions . In Towards Hardware-Intrinsic Security . Springer , 3--37. Roel Maes and Ingrid Verbauwhede. 2010. Physically unclonable functions: A study on the state of the art and future research directions. In Towards Hardware-Intrinsic Security. Springer, 3--37."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"e_1_3_2_1_25_1","unstructured":"Microsoft. [n.d.]. Amazon. https:\/\/www.microsoft.com  Microsoft. [n.d.]. Amazon. https:\/\/www.microsoft.com"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_26_1","unstructured":"Microsoft. 2020 . The Seven Properties of Highly Secure Devices . Retrieved March 19, 2020 from https:\/\/www.microsoft.com\/en-us\/research\/publication\/seven-properties-highly-secure-devices\/ Microsoft. 2020. The Seven Properties of Highly Secure Devices. Retrieved March 19, 2020 from https:\/\/www.microsoft.com\/en-us\/research\/publication\/seven-properties-highly-secure-devices\/"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_27_1","unstructured":"Mitre. 2020 . Common Vulnerabilities and Exposures . Retrieved April 03, 2020 from https:\/\/cve.mitre.org\/index.html Mitre. 2020. Common Vulnerabilities and Exposures. Retrieved April 03, 2020 from https:\/\/cve.mitre.org\/index.html"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7539"},{"key":"e_1_3_2_1_29_1","first-page":"2018","volume-title":"Retrieved","author":"NIST.","year":"2018","unstructured":"NIST. 2018 . CVE-2018-14786 . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2018 - 14786 NIST. 2018. CVE-2018-14786. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-14786"},{"key":"e_1_3_2_1_30_1","first-page":"2018","volume-title":"Retrieved","author":"NIST.","year":"2018","unstructured":"NIST. 2018 . CVE-2018-16546 . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2018 - 16546 NIST. 2018. CVE-2018-16546. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-16546"},{"key":"e_1_3_2_1_31_1","first-page":"2019","volume-title":"Retrieved","author":"NIST.","year":"2018","unstructured":"NIST. 2018 . CVE-2019-13523 . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2019 - 13523 NIST. 2018. CVE-2019-13523. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-13523"},{"key":"e_1_3_2_1_32_1","first-page":"2019","volume-title":"Retrieved","author":"NIST.","year":"2019","unstructured":"NIST. 2019 . CVE-2019-11220 . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2019 - 11220 NIST. 2019. CVE-2019-11220. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11220"},{"key":"e_1_3_2_1_33_1","first-page":"2019","volume-title":"Retrieved","author":"NIST.","year":"2019","unstructured":"NIST. 2019 . CVE-2019-14236 Detail . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2019 - 14236 NIST. 2019. CVE-2019-14236 Detail. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-14236"},{"key":"e_1_3_2_1_34_1","first-page":"2019","volume-title":"Retrieved","author":"NIST.","year":"2019","unstructured":"NIST. 2019 . CVE-2019-14239 Detail . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2019 - 14239 NIST. 2019. CVE-2019-14239 Detail. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-14239"},{"key":"e_1_3_2_1_35_1","first-page":"2019","volume-title":"Retrieved","author":"NIST.","year":"2019","unstructured":"NIST. 2019 . CVE-2019-17391 Detail . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2019 - 17391 NIST. 2019. CVE-2019-17391 Detail. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-17391"},{"key":"e_1_3_2_1_36_1","first-page":"2019","volume-title":"Retrieved","author":"NIST.","year":"2019","unstructured":"NIST. 2019 . CVE-2019-2267 Detail . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2019 - 2267 NIST. 2019. CVE-2019-2267 Detail. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-2267"},{"key":"e_1_3_2_1_37_1","first-page":"2019","volume-title":"Retrieved","author":"NIST.","year":"2019","unstructured":"NIST. 2019 . CVE-2019-5160 . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2019 - 5160 NIST. 2019. CVE-2019-5160. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-5160"},{"key":"e_1_3_2_1_38_1","first-page":"2019","volume-title":"Retrieved","author":"NIST.","year":"2019","unstructured":"NIST. 2019 . CVE-2019-5478 Detail . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2019 - 5478 NIST. 2019. CVE-2019-5478 Detail. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-5478"},{"key":"e_1_3_2_1_39_1","first-page":"2019","volume-title":"Retrieved","author":"NIST.","year":"2019","unstructured":"NIST. 2019 . CVE-2019-5995 . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2019 - 5995 NIST. 2019. CVE-2019-5995. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-5995"},{"key":"e_1_3_2_1_40_1","first-page":"2020","volume-title":"Retrieved","author":"NIST.","year":"2020","unstructured":"NIST. 2020 . CVE-2020-6769 Detail . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2020 - 6769 NIST. 2020. CVE-2020-6769 Detail. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-6769"},{"key":"e_1_3_2_1_41_1","first-page":"2020","volume-title":"Retrieved","author":"NIST.","year":"2020","unstructured":"NIST. 2020 . CVE-2020-9435 Detail . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2020 - 9435 NIST. 2020. CVE-2020-9435 Detail. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-9435"},{"key":"e_1_3_2_1_42_1","first-page":"2020","volume-title":"Retrieved","author":"NIST.","year":"2020","unstructured":"NIST. 2020 . CVE-2020-9544 Detail . Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2020 - 9544 NIST. 2020. CVE-2020-9544 Detail. Retrieved March 19, 2020 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-9544"},{"key":"e_1_3_2_1_43_1","volume-title":"Retrieved","author":"U.S. Department of Homeland Security.","year":"2016","unstructured":"U.S. Department of Homeland Security. 2016 . Strategic Pronciples for securing the IoT . Retrieved March 19, 2020 from https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/Strategic_Principles_for_Securing_the_Internet_of_Things-2016-1115-FINAL....pdf U.S. Department of Homeland Security. 2016. Strategic Pronciples for securing the IoT. Retrieved March 19, 2020 from https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/Strategic_Principles_for_Securing_the_Internet_of_Things-2016-1115-FINAL....pdf"},{"key":"e_1_3_2_1_44_1","volume-title":"Retrieved","author":"OWASP.","year":"2020","unstructured":"OWASP. 2020 . IoT top vulnerabilities . Retrieved March 19, 2020 from https:\/\/owasp.org\/www-project-internet-of-things\/ OWASP. 2020. IoT top vulnerabilities. Retrieved March 19, 2020 from https:\/\/owasp.org\/www-project-internet-of-things\/"},{"key":"e_1_3_2_1_46_1","unstructured":"STMicroelectronics. 2020. B-L475E-IOT01A. https:\/\/www.st.com\/en\/evaluation-tools\/b-l475e-iot01a.html  STMicroelectronics. 2020. B-L475E-IOT01A. https:\/\/www.st.com\/en\/evaluation-tools\/b-l475e-iot01a.html"},{"key":"e_1_3_2_1_47_1","unstructured":"STMicroelectronics. 2020. STM32 ST-LINK Utility. https:\/\/www.st.com\/en\/development-tools\/stsw-link004.html  STMicroelectronics. 2020. STM32 ST-LINK Utility. https:\/\/www.st.com\/en\/development-tools\/stsw-link004.html"},{"key":"e_1_3_2_1_48_1","unstructured":"STMicroelectronics. 2020. STM32L475VG. https:\/\/www.st.com\/en\/microcontrollers-microprocessors\/stm32l475vg.html  STMicroelectronics. 2020. STM32L475VG. https:\/\/www.st.com\/en\/microcontrollers-microprocessors\/stm32l475vg.html"},{"key":"e_1_3_2_1_49_1","unstructured":"The Verge. 2020. Zoom isn't actually E2E encrypted. https:\/\/www.theverge.com\/2020\/3\/31\/21201234\/zoom-end-to-end-encryption-video-chats-meetings  The Verge. 2020. Zoom isn't actually E2E encrypted. https:\/\/www.theverge.com\/2020\/3\/31\/21201234\/zoom-end-to-end-encryption-video-chats-meetings"},{"key":"e_1_3_2_1_50_1","unstructured":"Wikipedia. [n.d.]. CSR. Retrieved April 03 2020 from https:\/\/en.wikipedia.org\/wiki\/Certificate_signing_request  Wikipedia. [n.d.]. CSR. Retrieved April 03 2020 from https:\/\/en.wikipedia.org\/wiki\/Certificate_signing_request"},{"key":"e_1_3_2_1_51_1","unstructured":"Wikipedia. [n.d.]. Transport Layer Security. https:\/\/en.wikipedia.org\/wiki\/Transport_Layer_Security  Wikipedia. [n.d.]. Transport Layer Security. https:\/\/en.wikipedia.org\/wiki\/Transport_Layer_Security"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_52_1","unstructured":"Wikipedia. 2020 . Internet of Things . Retrieved March 19, 2020 from https:\/\/en.wikipedia.org\/wiki\/Internet_of_things Wikipedia. 2020. Internet of Things. Retrieved March 19, 2020 from https:\/\/en.wikipedia.org\/wiki\/Internet_of_things"},{"key":"e_1_3_2_1_53_1","volume-title":"The context-tree weighting method: basic properties","author":"Willems Frans MJ","year":"1995","unstructured":"Frans MJ Willems , Yuri M Shtarkov , and Tjalling J Tjalkens . 1995. The context-tree weighting method: basic properties . IEEE transactions on information theory 41, 3 ( 1995 ), 653--664. Frans MJ Willems, Yuri M Shtarkov, and Tjalling J Tjalkens. 1995. The context-tree weighting method: basic properties. IEEE transactions on information theory 41, 3 (1995), 653--664."}],"event":{"name":"ARES 2020: The 15th International Conference on Availability, Reliability and Security","acronym":"ARES 2020","location":"Virtual Event Ireland"},"container-title":["Proceedings of the 15th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3407075","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407023.3407075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:42Z","timestamp":1750195482000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3407075"}},"subtitle":["a security solution for IoT life cycle"],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"references-count":52,"alternative-id":["10.1145\/3407023.3407075","10.1145\/3407023"],"URL":"https:\/\/doi.org\/10.1145\/3407023.3407075","relation":{},"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"2020-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}