{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:52Z","timestamp":1763507752031,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427253","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"717-732","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Verify&amp;Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices"],"prefix":"10.1145","author":[{"given":"Mahmoud","family":"Ammar","sequence":"first","affiliation":[{"name":"KU Leuven"}]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[{"name":"University of Trento"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_1_2_1","unstructured":"ZigBee Alliance. 2010. Zigbee alliance. WPAN industry group http:\/\/www. zigbee. org\/. The industry group responsible for the ZigBee standard and certification (2010).  ZigBee Alliance. 2010. Zigbee alliance. WPAN industry group http:\/\/www. zigbee. org\/. The industry group responsible for the ZigBee standard and certification (2010)."},{"volume-title":"25th USENIX Security Symposium (USENIX Security 16)","year":"2016","author":"Almeida Jos\u00e9\u00a0Bacelar","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978335"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386688"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2928541"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS48487.2020.00036"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176337"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2018.8589107"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2018.8625142"},{"volume-title":"26th USENIX Security Symposium (USENIX Security 17)","year":"2017","author":"Antonakakis Manos","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2858422"},{"key":"e_1_3_2_1_14_1","unstructured":"Atmel. 2009. AVR ATmega 1284p 8-bit microcontroller. http:\/\/www.atmel.com\/images\/doc8059.pdf. [Online; accessed 13-May-2020].  Atmel. 2009. AVR ATmega 1284p 8-bit microcontroller. http:\/\/www.atmel.com\/images\/doc8059.pdf. [Online; accessed 13-May-2020]."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33481-8_9"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/mic.2012.29"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68979-9_2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053010"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196526"},{"volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1191\u20131194","year":"2018","author":"Carpent Xavier","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653711"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154448.3154454"},{"volume-title":"Airmed: Efficient Self-Healing Network of Low-End Devices. arXiv preprint arXiv:2004.12442(2020).","year":"2020","author":"Das Sourav","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.03.013"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062276"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2008.23"},{"volume-title":"19th NDSS Symposium. The Internet Society.","year":"2012","author":"Eldefrawy Karim","key":"e_1_3_2_1_30_1"},{"volume-title":"29th USENIX Security Symposium (USENIX Security 20)","year":"2020","author":"Ender Maik","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","unstructured":"GlobeNewsWire. 2019. IoT MCU Market To Reach USD 4.61 Billion By 2026 | Reports And Data. https:\/\/www.globenewswire.com\/news-release\/2019\/03\/27\/1774199\/0\/en\/IoT-MCU-Market-To-Reach-USD-4-61-Billion-By-2026-Reports-And-Data.html. [Online; accessed 01-November-2019].  GlobeNewsWire. 2019. IoT MCU Market To Reach USD 4.61 Billion By 2026 | Reports And Data. https:\/\/www.globenewswire.com\/news-release\/2019\/03\/27\/1774199\/0\/en\/IoT-MCU-Market-To-Reach-USD-4-61-Billion-By-2026-Reports-And-Data.html. [Online; accessed 01-November-2019]."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Manuel Huber Stefan Hristozov Simon Ott Vasil Sarafov and Marcus Peinado. 2020. The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things. arXiv preprint arXiv:2005.09714(2020).  Manuel Huber Stefan Hristozov Simon Ott Vasil Sarafov and Marcus Peinado. 2020. The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things. arXiv preprint arXiv:2005.09714(2020).","DOI":"10.1145\/3320269.3384723"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_36"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098260"},{"key":"e_1_3_2_1_37_1","unstructured":"IMEC. 2020. The medical implants of the future: faster smarter and more connected. https:\/\/www.imec-int.com\/en\/imec-magazine\/imec-magazine-april-2020\/the-medical-implants-of-the-future-faster-smarter-and-more-connected. [Online; accessed 29-May-2020].  IMEC. 2020. The medical implants of the future: faster smarter and more connected. https:\/\/www.imec-int.com\/en\/imec-magazine\/imec-magazine-april-2020\/the-medical-implants-of-the-future-faster-smarter-and-more-connected. [Online; accessed 29-May-2020]."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20398-5_4"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342559.3365338"},{"key":"e_1_3_2_1_40_1","first-page":"2011","article-title":"SC22\/WG14","volume":"9899","author":"Jtc ISO","year":"2011","journal-title":"ISO\/IEC"},{"volume-title":"Securing the future of German manufacturing industry: Recommendations for implementing the strategic initiative INDUSTRIE 4.0. Final report of the Industrie 4, 0","year":"2013","author":"Kagermann Henning","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270348"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_17"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.45"},{"volume-title":"Ransomware Hijacks Hotel Smart Keys to Lock Guests Out of their Rooms. https:\/\/thehackernews.com\/2017\/01\/ransomware-hotel-smart-lock.html. [Online","year":"2020","author":"Kumar Mohit","key":"e_1_3_2_1_46_1"},{"volume-title":"https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone. [Online","year":"2020","author":"Ltd ARM","key":"e_1_3_2_1_47_1"},{"volume-title":"Demonstration of micropnp: the zero-configuration wireless sensing and actuation platform","author":"Matthys Nelson","key":"e_1_3_2_1_48_1"},{"volume-title":"Internet-Draft draft-moran-suit-architecture-03","year":"2018","author":"Moran Brendan","key":"e_1_3_2_1_49_1"},{"key":"e_1_3_2_1_50_1","unstructured":"Dave Muoio. 2020. FDA warns of Bluetooth Low Energy vulnerability affecting connected medical devices. https:\/\/www.mobihealthnews.com\/news\/fda-warns-bluetooth-low-energy-vulnerability-affecting-connected-medical-devices. [Online; accessed 29-May-2020].  Dave Muoio. 2020. FDA warns of Bluetooth Low Energy vulnerability affecting connected medical devices. https:\/\/www.mobihealthnews.com\/news\/fda-warns-bluetooth-low-energy-vulnerability-affecting-connected-medical-devices. [Online; accessed 29-May-2020]."},{"volume-title":"Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). 479\u2013498.","year":"2013","author":"Noorman Job","key":"e_1_3_2_1_51_1"},{"volume-title":"VRASED: A Verified Hardware\/Software Co-Design for Remote Attestation. In 28th USENIX Security Symposium (USENIX Security 19)","year":"2019","author":"De\u00a0Oliveira Nunes Ivan","key":"e_1_3_2_1_52_1"},{"volume-title":"Reset and Erasure in Low-End Embedded Systems. In 38th IEEE\/ACM International Conference on Computer-Aided Design - ICCAD.","year":"2019","author":"De\u00a0Oliveira Nunes Ivan","key":"e_1_3_2_1_53_1"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Ivan De\u00a0Oliveira Nunes Sashidhar Jakkamsetti Norrathep Rattanavipanon and Gene Tsudik. 2020. On the TOCTOU Problem in Remote Attestation. arXiv preprint arXiv:2005.03873(2020).  Ivan De\u00a0Oliveira Nunes Sashidhar Jakkamsetti Norrathep Rattanavipanon and Gene Tsudik. 2020. On the TOCTOU Problem in Remote Attestation. arXiv preprint arXiv:2005.03873(2020).","DOI":"10.1145\/3460120.3484532"},{"volume-title":"Bootstrapping trust in commodity computers","author":"Parno Bryan","key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2010.32"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_39"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110261"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICVD.2004.1260985"},{"volume-title":"GLOBAL IOT MICROCONTROLLER (MCU) MARKET FORECAST 2018-2026","year":"2018","author":"Research Inkwood","key":"e_1_3_2_1_59_1"},{"volume-title":"Logic in Computer Science","author":"Reynolds C","key":"e_1_3_2_1_60_1"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866315"},{"volume-title":"SAKE: Software Attestation for Key Establishment in Sensor Networks. In Distributed Computing in Sensor Systems","year":"2008","author":"Seshadri Arvind","key":"e_1_3_2_1_62_1"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_66_1","first-page":"1","article-title":"GANGRENE: Exploring the Mortality of Flash Memory.","volume":"12","author":"Templeman Robert","year":"2012","journal-title":"HotSec"},{"volume-title":"Hackers broke into a casino\u2019s high-roller database through a thermometer in the lobby fish tank. https:\/\/www.digitaltrends.com\/home\/casino-iot-hackers-fish-tank\/. [Online","year":"2020","author":"Trends Digital","key":"e_1_3_2_1_67_1"},{"key":"e_1_3_2_1_68_1","unstructured":"Trusted Computing Group. 2011. TPM Main Specification Level 2 Version 1.2. http:\/\/www.trustedcomputinggroup.org\/tpm-main-specification\/. [Online; accessed 01-November-2019].  Trusted Computing Group. 2011. TPM Main Specification Level 2 Version 1.2. http:\/\/www.trustedcomputinggroup.org\/tpm-main-specification\/. [Online; accessed 01-November-2019]."},{"volume-title":"Your One-Stop Shop for Industry 4.0 Success. https:\/\/www.versasense.com\/files\/VersaSense-Brochure.pdf. [Online","year":"2020","key":"e_1_3_2_1_69_1"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Robert Wahbe Steven Lucco Thomas\u00a0E Anderson and Susan\u00a0L Graham. 1994. Efficient software-based fault isolation. In ACM SIGOPS Operating Systems Review Vol.\u00a027. ACM 203\u2013216.  Robert Wahbe Steven Lucco Thomas\u00a0E Anderson and Susan\u00a0L Graham. 1994. Efficient software-based fault isolation. In ACM SIGOPS Operating Systems Review Vol.\u00a027. ACM 203\u2013216.","DOI":"10.1145\/173668.168635"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2013.97"},{"key":"e_1_3_2_1_72_1","unstructured":"Thomas Watteyne Maria-Rita Palattella and Luigi\u00a0Alfredo Grieco. 2015. Using IEEE 802.15. 4e time-slotted channel hopping (TSCH) in the internet of things (IoT): Problem statement. (2015).  Thomas Watteyne Maria-Rita Palattella and Luigi\u00a0Alfredo Grieco. 2015. Using IEEE 802.15. 4e time-slotted channel hopping (TSCH) in the internet of things (IoT): Problem statement. (2015)."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00084"},{"volume-title":"ARMv8-M architecture technical overview. ARM WHITE PAPER","year":"2015","author":"Yiu Joseph","key":"e_1_3_2_1_74_1"},{"key":"e_1_3_2_1_75_1","unstructured":"Ross Yu. 2017. SmartMesh IP Wireless Mesh Networks Expand to Address Industrial IoT Networks. https:\/\/www.fierceelectronics.com\/iot-wireless\/smartmesh-ip-wireless-mesh-networks-expand-to-address-industrial-iot-networks. [Online; accessed 22-May-2020].  Ross Yu. 2017. SmartMesh IP Wireless Mesh Networks Expand to Address Industrial IoT Networks. https:\/\/www.fierceelectronics.com\/iot-wireless\/smartmesh-ip-wireless-mesh-networks-expand-to-address-industrial-iot-networks. [Online; accessed 22-May-2020]."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304017"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3328729"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038642.2038687"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134043"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427253","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427253"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":78,"alternative-id":["10.1145\/3427228.3427253","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427253","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}