{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:12Z","timestamp":1750220652638,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427235","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"542-555","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes"],"prefix":"10.1145","author":[{"given":"Corentin","family":"Thomasset","sequence":"first","affiliation":[{"name":"Polytechnique Montr\u00e9al, Canada"}]},{"given":"David","family":"Barrera","sequence":"additional","affiliation":[{"name":"Carleton Univeristy, Canada"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Your smart fridge could be mining Bitcoins for criminals. CBC News. https:\/\/www.cbc.ca\/news\/technology\/bitcoin-hacking-smart-devices-1.4728222  2018. Your smart fridge could be mining Bitcoins for criminals. CBC News. https:\/\/www.cbc.ca\/news\/technology\/bitcoin-hacking-smart-devices-1.4728222"},{"key":"e_1_3_2_1_2_1","unstructured":"2020. Google denies Xiaomi access over security bug. BBC. https:\/\/www.bbc.com\/news\/technology-50981993  2020. Google denies Xiaomi access over security bug. BBC. https:\/\/www.bbc.com\/news\/technology-50981993"},{"key":"e_1_3_2_1_3_1","unstructured":"Mansoor Ahmed-Rengers and Kari Kostiainen. 2020. Don\u2019t Mine Wait in Line: Fair and Efficient Blockchain Consensus with Robust Round Robin. arXiv preprint arXiv:1804.07391v3(2020).  Mansoor Ahmed-Rengers and Kari Kostiainen. 2020. Don\u2019t Mine Wait in Line: Fair and Efficient Blockchain Consensus with Robust Round Robin. arXiv preprint arXiv:1804.07391v3(2020)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"volume-title":"26th USENIX Security.","author":"Antonakakis Manos","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"Adam Back. 1997. A partial hash collision based postage scheme. http:\/\/www.hashcash.org\/papers\/announce.txt  Adam Back. 1997. A partial hash collision based postage scheme. http:\/\/www.hashcash.org\/papers\/announce.txt"},{"volume-title":"IDIoT: Securing the Internet of Things like it\u2019s","year":"1994","author":"Barrera David","key":"e_1_3_2_1_7_1"},{"volume-title":"Blockchain Consensus Protocols in the Wild. In 31st International Symposium on Distributed Computing.","year":"2017","author":"Cachin Christian","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Tomer Golomb Yisroel Mirsky and Yuval Elovici. 2018. CIoTA: Collaborative IoT anomaly detection via blockchain. arXiv preprint arXiv:1803.03807(2018).  Tomer Golomb Yisroel Mirsky and Yuval Elovici. 2018. CIoTA: Collaborative IoT anomaly detection via blockchain. arXiv preprint arXiv:1803.03807(2018).","DOI":"10.14722\/diss.2018.23003"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"volume-title":"Hestia: Simple Least Privilege Network Policies for Smart Homes. In 12th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec).","year":"2019","author":"Goutam Sanket","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2704093"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Stephen Herwig Katura Harvey George Hughey Richard Roberts and Dave Levin. 2019. Measurement and Analysis of Hajime a Peer-to-peer IoT Botnet.. In NDSS.  Stephen Herwig Katura Harvey George Hughey Richard Roberts and Dave Levin. 2019. Measurement and Analysis of Hajime a Peer-to-peer IoT Botnet.. In NDSS.","DOI":"10.14722\/ndss.2019.23488"},{"key":"e_1_3_2_1_15_1","unstructured":"Hyperledger. [n.d.]. PoET 1.0 Specification. https:\/\/sawtooth.hyperledger.org\/docs\/core\/releases\/latest\/architecture\/poet.html  Hyperledger. [n.d.]. PoET 1.0 Specification. https:\/\/sawtooth.hyperledger.org\/docs\/core\/releases\/latest\/architecture\/poet.html"},{"key":"e_1_3_2_1_16_1","unstructured":"Intel. [n.d.]. Software Guard Extensions. https:\/\/software.intel.com\/en-us\/sgx  Intel. [n.d.]. Software Guard Extensions. https:\/\/software.intel.com\/en-us\/sgx"},{"volume-title":"Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks. In NDSS.","year":"1999","author":"Juels Ari","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"Simon Kenin. 2017. BrickerBot mod_plaintext Analysis. https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/brickerbot-mod_plaintext-analysis\/  Simon Kenin. 2017. BrickerBot mod_plaintext Analysis. https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/brickerbot-mod_plaintext-analysis\/"},{"volume-title":"Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol","year":"2017","author":"Kiayias Aggelos","key":"e_1_3_2_1_19_1"},{"volume-title":"Future of Information and Communication Conference.","year":"2019","author":"Kumar Ayush","key":"e_1_3_2_1_20_1"},{"volume-title":"28th USENIX Security.","author":"Kumar Deepak","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_23_1","unstructured":"Jon Matonis. 2014. The Bitcoin Mining Arms Race: GHash.io and the 51% Issue. https:\/\/www.coindesk.com\/bitcoin-mining-detente-ghash-io-51-issue  Jon Matonis. 2014. The Bitcoin Mining Arms Race: GHash.io and the 51% Issue. https:\/\/www.coindesk.com\/bitcoin-mining-detente-ghash-io-51-issue"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"volume-title":"Blockchain-Based Whitelisting for Consumer IoT Devices and Home Networks. In 19th Annual SIG Conference on Information Technology Education.","year":"2018","author":"Mendez\u00a0Mena M","key":"e_1_3_2_1_25_1"},{"volume-title":"IEEE 37th International Conference on Distributed Computing Systems (ICDCS).","year":"2017","author":"Miettinen Markus","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"volume-title":"Bitcoin: A peer-to-peer electronic cash system.","year":"2008","author":"Nakamoto Satoshi","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"Lily\u00a0Hay Newman. 2018. An Elaborate Hack Shows How Much Damage IoT Bugs Can Do. wired.com\/story\/elaborate-hack-shows-damage-iot-bugs-can-do\/  Lily\u00a0Hay Newman. 2018. An Elaborate Hack Shows How Much Damage IoT Bugs Can Do. wired.com\/story\/elaborate-hack-shows-damage-iot-bugs-can-do\/"},{"key":"e_1_3_2_1_30_1","unstructured":"Ray and Michael Huebler. 2019. Moving from Hacking IoT Gadgets to Breaking into One of Europe\u2019s Highest Hotel Suites. Black Hat USA.  Ray and Michael Huebler. 2019. Moving from Hacking IoT Gadgets to Breaking into One of Europe\u2019s Highest Hotel Suites. Black Hat USA."},{"volume-title":"SVELTE: Real-time intrusion detection in the Internet of Things. Ad hoc networks 11, 8","year":"2013","author":"Raza Shahid","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","unstructured":"Scott Ruoti Ben Kaiser Arkady Yerukhimovich Jeremy Clark and Robert Cunningham. 2019. SoK: Blockchain Technology and Its Potential Use Cases. arXiv preprint arXiv:1909.12454(2019).  Scott Ruoti Ben Kaiser Arkady Yerukhimovich Jeremy Clark and Robert Cunningham. 2019. SoK: Blockchain Technology and Its Potential Use Cases. arXiv preprint arXiv:1909.12454(2019)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"volume-title":"Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In 27th USENIX Security.","year":"2018","author":"Van\u00a0Bulck Jo","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_22"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427235","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427235"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":34,"alternative-id":["10.1145\/3427228.3427235","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427235","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}