{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T00:48:59Z","timestamp":1774745339082,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["236615297,440059533"],"award-info":[{"award-number":["236615297,440059533"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484788","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"2890-2905","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints"],"prefix":"10.1145","author":[{"given":"Sebastian","family":"Surminski","sequence":"first","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]},{"given":"Christian","family":"Niesler","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]},{"given":"Ferdinand","family":"Brasser","sequence":"additional","affiliation":[{"name":"Technical University Darmstadt, Darmstadt, Germany"}]},{"given":"Lucas","family":"Davi","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technical University Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1383422.1383443"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_2_2_5_1","unstructured":"Anna-senpai. 2017. GitHub - Mirai Source Code. https:\/\/github.com\/jgamblin\/Mirai-Source-Code Retrieved 2021-04-09 from"},{"key":"e_1_3_2_2_6_1","unstructured":"ARM Limited. 2009. Security technology building a secure system using trustzone technology (white paper)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516650"},{"key":"e_1_3_2_2_8_1","unstructured":"AspenCore. 2019. 2019 Embedded Markets Study. https:\/\/www.embedded.com\/wp-content\/uploads\/2019\/11\/EETimes_Embedded_2019_Embedded_Markets_Study.pdf Retrieved 2021-05-07 from"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","unstructured":"Kaitlin Boeckl Michael Fagan William Fisher Naomi Lefkovitz Katerina Megas Ellen Nadeau Benjamin Piccarreta Danna O'Rourke and Karen Scarfone. 2019. Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks. https:\/\/doi.org\/10.6028\/NIST.IR.8228","DOI":"10.6028\/NIST.IR.8228"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898083"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653711"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18124356"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2016.7763373"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2548426"},{"key":"e_1_3_2_2_16_1","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. (2016). http:\/\/eprint.iacr.org\/2016\/086"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2548561"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978802.1978814"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240821"},{"key":"e_1_3_2_2_20_1","volume-title":"SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In 19th Annual Network and Distributed System Security Symposium, NDSS 2012","author":"Eldefrawy Karim","year":"2012","unstructured":"Karim Eldefrawy, Gene Tsudik, Aur\u00e9 lien Francillon, and Daniele Perito. 2012. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In 19th Annual Network and Distributed System Security Symposium, NDSS 2012. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2012\/smart-secure-and-minimal-architecture-establishing-dynamic-root-trust"},{"key":"e_1_3_2_2_21_1","unstructured":"elm-tech. 2021 a. GD25Q32 Datasheet. https:\/\/chipmaster.pro\/wp-content\/uploads\/2019\/04\/GD25Q32.pdf Retrieved 2021-07--26 from"},{"key":"e_1_3_2_2_22_1","unstructured":"elm-tech. 2021 b. GD25Q32C Datasheet. http:\/\/www.elm-tech.com\/en\/products\/spi-flash-memory\/gd25q32\/gd25q32.pdf Retrieved 2021-07--26 from"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-018-0123--6"},{"key":"e_1_3_2_2_24_1","unstructured":"Espressif Systems. 2018. Espressif Achieves the 100-Million Target for IoT Chip Shipments. online. https:\/\/www.espressif.com\/en\/news\/Espressif_Achieves_the_Hundredmillion_Target_for_IoT_Chip_Shipments Retrieved 2021-05-07 from"},{"key":"e_1_3_2_2_25_1","unstructured":"Espressif Systems. 2020. ESP32 Technical Reference Manual. online. https:\/\/www.espressif.com\/sites\/default\/files\/documentation\/esp32_technical_reference_manual_en.pdf Retrieved 2021-05-07 from"},{"key":"e_1_3_2_2_26_1","unstructured":"Espressif Systems. 2021 a. ESP32 Series Datasheet. online. https:\/\/www.espressif.com\/sites\/default\/files\/documentation\/esp32_datasheet_en.pdf Retrieved 2021-05-03 from"},{"key":"e_1_3_2_2_27_1","unstructured":"Espressif Systems. 2021 b. Memory Capabilities. https:\/\/docs.espressif.com\/projects\/esp-idf\/en\/latest\/esp32\/api-reference\/system\/mem_alloc.html Retrieved 2021-07-06 from"},{"key":"e_1_3_2_2_28_1","unstructured":"Espressif Systems. 2021 c. Over The Air Updates (OTA). online. https:\/\/docs.espressif.com\/projects\/esp-idf\/en\/latest\/esp32\/api-reference\/system\/ota.html Retrieved 2021-05-06 from"},{"key":"e_1_3_2_2_29_1","unstructured":"Espressif Systems. 2021 d. Partition Tables. online. https:\/\/docs.espressif.com\/projects\/esp-idf\/en\/latest\/esp32\/api-guides\/partition-tables.html Retrieved 2021-05-06 from"},{"key":"e_1_3_2_2_30_1","unstructured":"FreeRTOS. 2021. GitHub - FreeRTOS. https:\/\/github.com\/FreeRTOS\/FreeRTOS\/tree\/master Retrieved 2021-05-07 from"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.160"},{"key":"e_1_3_2_2_32_1","unstructured":"Dan Goodin. 2016. Brace yourselves-source code powering potent IoT DDoSes just went public. http:\/\/arstechnica.com\/security\/2016\/10\/brace-yourselves-source-code-powering-potent-iot-ddoses-just-went-public\/ Retrieved 2021-04-09 from"},{"key":"e_1_3_2_2_33_1","volume-title":"Overview of the Internet of things. Recommendation Y.2060","author":"ITU-T.","unstructured":"ITU-T. 2012. Overview of the Internet of things. Recommendation Y.2060. International Telecommunication Union."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_2_36_1","volume-title":"authentication, and public key systems","author":"Merkle Ralph Charles","unstructured":"Ralph Charles Merkle. 1979. Secrecy, authentication, and public key systems .Stanford University."},{"key":"e_1_3_2_2_37_1","unstructured":"National Institute of Standards and Technology. 2008. Secure Hash Standard (FIPS 180--3). https:\/\/csrc.nist.gov\/publications\/detail\/fips\/180\/3\/archive\/2008--10--31 Retrieved 2021-09--14 from"},{"key":"e_1_3_2_2_38_1","unstructured":"National Institute of Standards and Technology. 2015. Secure Hash Standard (SHS). https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.180--4.pdf Retrieved 2021-09--12 from"},{"key":"e_1_3_2_2_39_1","volume-title":"HERA: Hotpatching of Embedded Real-time Applications. In 28th Annual Network and Distributed System Security Symposium, NDSS","author":"Niesler Christian","year":"2021","unstructured":"Christian Niesler, Sebastian Surminski, and Lucas Davi. 2021. HERA: Hotpatching of Embedded Real-time Applications. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/hera-hotpatching-of-embedded-real-time-applications\/"},{"key":"e_1_3_2_2_40_1","volume-title":"VRASED: A Verified Hardware\/Software Co-Design for Remote Attestation. In 28th USENIX Security Symposium, USENIX Security","author":"Oliveira Nunes Ivan De","year":"2019","unstructured":"Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, and Gene Tsudik. 2019 b. VRASED: A Verified Hardware\/Software Co-Design for Remote Attestation. In 28th USENIX Security Symposium, USENIX Security 2019. USENIX Association."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942118"},{"key":"e_1_3_2_2_42_1","volume-title":"29th USENIX Security Symposium, USENIX Security","author":"Oliveira Nunes Ivan De","year":"2020","unstructured":"Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, and Gene Tsudik. 2020. APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise. In 29th USENIX Security Symposium, USENIX Security 2020. USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/nunes"},{"key":"e_1_3_2_2_43_1","volume-title":"Internet of Things (IoT) Top 10","author":"OWASP.","year":"2018","unstructured":"OWASP. 2018. Internet of Things (IoT) Top 10 2018. https:\/\/owasp.org\/www-pdf-archive\/OWASP-IoT-Top-10--2018-final.pdf Retrieved 2021-05-06 from"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.20"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CODESISSS.2015.7331385"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","unstructured":"Weidong Shi Hsien-Hsin S. Lee Laura Falk and Mrinmoy Ghosh. 2006. An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors. (2006). https:\/\/doi.org\/10.1109\/ISCA.2006.8","DOI":"10.1109\/ISCA.2006.8"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2016.7568958"},{"key":"e_1_3_2_2_49_1","volume-title":"Shin and Parameswaran Ramanathan","author":"Kang","year":"1994","unstructured":"Kang G. Shin and Parameswaran Ramanathan. 1994. Real-Time Computing: A New Discipline of Computer Science and Engineering. In Proceedings of IEEE, Special Issue on Real-Time Systems. IEEE."},{"key":"e_1_3_2_2_50_1","unstructured":"Spectra Industrie-PC und Automation. 2021. Embedded Configuration Manager (ECM). https:\/\/www.spectra.de\/cms\/splash\/embedded-configuration-manager\/ Retrieved 2021-07--13 from"},{"key":"e_1_3_2_2_51_1","unstructured":"Embedded Staff. 2006. Catching the Z-Wave. https:\/\/www.embedded.com\/catching-the-z-wave\/ Retrieved 2021-04--28 from"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:TIME.0000045319.20260.73"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988546"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","unstructured":"Keith Stouffer Victoria Pillitteri Suzanne Lightman Marshall Abrams and Adam Hahn. 2015. Guide to Industrial Control Systems (ICS) Security. https:\/\/doi.org\/10.6028\/NIST.SP.800--82r2","DOI":"10.6028\/NIST.SP.800--82r2"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_2_56_1","volume-title":"Open-source syringe pump library. PloS one","author":"Wijnen Bas","year":"2014","unstructured":"Bas Wijnen, Emily J Hunt, Gerald C Anzalone, and Joshua M Pearce. 2014. Open-source syringe pump library. PloS one, Vol. 9, 9 (2014)."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIES.2012.6356583"},{"key":"e_1_3_2_2_58_1","unstructured":"Ally Winning. 2019. Number of automotive ECUs continues to rise. online. https:\/\/www.eenewsautomotive.com\/news\/number-automotive-ecus-continues-rise Retrieved 2021-05-03 from"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.31"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054977.3054999"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2013.6531076"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744869"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203803"},{"key":"e_1_3_2_2_65_1","unstructured":"Kim Zetter. 2015. A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever. https:\/\/www.wired.com\/2015\/01\/german-steel-mill-hack-destruction\/ Retrieved 2021-04-09 from"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484788","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:53:53Z","timestamp":1763499233000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484788"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":65,"alternative-id":["10.1145\/3460120.3484788","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484788","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}