{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:12:22Z","timestamp":1767262342927,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB2902203"],"award-info":[{"award-number":["2022YFB2902203"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3656288","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"716-727","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Formal Analysis of Data Distribution Service Security"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7278-7767","authenticated-orcid":false,"given":"Binghan","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3629-0233","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6135-8052","authenticated-orcid":false,"given":"Jingjing","family":"Guan","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Abu Shohel Ahmed Aleksi Peltonen Mohit Sethi and Tuomas Aura. 2023. Security Analysis of the Consumer Remote SIM Provisioning Protocol. arXiv:2211.15323 [cs.CR]","DOI":"10.1145\/3663761"},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved","author":"Arguedas Mikael","year":"2023","unstructured":"Mikael Arguedas. 2023. SROS2. Retrieved November 21, 2023 from https:\/\/github.com\/ros2\/sros2"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"Authors The","year":"2023","unstructured":"The Authors. 2023. DDS-SecurityVerif. Retrieved November 21, 2023 from https:\/\/github.com\/biiNG\/DDS-SecurityVerif"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559360"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Bruno Blanchet et al. 2016. Modeling and verifying security protocols with the applied pi calculus and ProVerif. Foundations and Trends\u00ae in Privacy and Security 1 1--2 (2016) 1--135.","DOI":"10.1561\/3300000004"},{"key":"e_1_3_2_1_6_1","volume-title":"16th Annual Symposium on Logic in Computer Science---LICS","volume":"1","author":"Cervesato Iliano","year":"2001","unstructured":"Iliano Cervesato. 2001. The Dolev-Yao intruder is the most powerful attacker. In 16th Annual Symposium on Logic in Computer Science---LICS, Vol. 1. Citeseer, 1--2."},{"key":"e_1_3_2_1_7_1","first-page":"315","volume-title":"Retrieved","author":"CISA.","year":"2022","unstructured":"CISA. 2022. Multiple Data Distribution Service (DDS) implementations (Update A). Retrieved November 21, 2023 from https:\/\/www.cisa.gov\/news-events\/ics-advisories\/icsa-21-315-02"},{"key":"e_1_3_2_1_8_1","volume-title":"Network and Distributed System Security Symposium (NDSS). Internet Society.","author":"Cremers Cas","year":"2019","unstructured":"Cas Cremers and Martin Dehnel-Wild. 2019. Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion. In Network and Distributed System Security Symposium (NDSS). Internet Society."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 739--753","author":"Deng Gelei","year":"2022","unstructured":"Gelei Deng, Guowen Xu, Yuan Zhou, Tianwei Zhang, and Yang Liu. 2022. On the (In) Security of Secure ROS2. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 739--753."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi15010024"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"43","DOI":"10.37868\/sei.v1i1.36","article-title":"DoS and DDoS vulnerability of IoT: a review","volume":"1","author":"D\u017eaferovi\u0107 Emina","year":"2019","unstructured":"Emina D\u017eaferovi\u0107, Ajla Sokol, Ali Abd Almisreb, and Syamimi Mohd Norzeli. 2019. DoS and DDoS vulnerability of IoT: a review. Sustainable Engineering and Innovation 1, 1 (2019), 43--48.","journal-title":"Sustainable Engineering and Innovation"},{"volume-title":"Retrieved","year":"2023","key":"e_1_3_2_1_13_1","unstructured":"Eclipse. 2023. Cyclone DDS. Retrieved November 21, 2023 from https:\/\/projects.eclipse.org\/projects\/iot.cyclonedds"},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_14_1","unstructured":"eProsima. 2019. DDS:Access:Permissions. Retrieved November 21, 2023 from https:\/\/fast-dds.docs.eprosima.com\/en\/latest\/fastdds\/security\/access_control_plugin\/access_control_plugin.html"},{"volume-title":"Retrieved","year":"2023","key":"e_1_3_2_1_15_1","unstructured":"eProsima. 2023. Fast DDS. Retrieved November 21, 2023 from https:\/\/www.eprosima.com\/index.php\/resources-all\/whitepapers\/dds"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.sysarc.2017.11.001","article-title":"Integration of data distribution service and distributed partitioned systems","volume":"83","author":"Garc\u00eda-Valls Marisol","year":"2018","unstructured":"Marisol Garc\u00eda-Valls, Jorge Dom\u00ednguez-Poblete, Imad Eddine Touahria, and Chenyang Lu. 2018. Integration of data distribution service and distributed partitioned systems. Journal of Systems Architecture 83 (2018), 23--31.","journal-title":"Journal of Systems Architecture"},{"key":"e_1_3_2_1_17_1","volume-title":"Retrieved","author":"Object Management Group","year":"2015","unstructured":"Object Management Group. 2015. OMG Data Distribution Service Specification Version 1.4. Retrieved November 21, 2023 from https:\/\/www.omg.org\/spec\/DDS\/"},{"key":"e_1_3_2_1_18_1","volume-title":"Retrieved","author":"Object Management Group","year":"2018","unstructured":"Object Management Group. 2018. DDS Security Specification Version 1.1. Retrieved November 21, 2023 from https:\/\/www.omg.org\/spec\/DDS-SECURITY\/1.1"},{"key":"e_1_3_2_1_19_1","volume-title":"Retrieved","author":"Object Management Group","year":"2019","unstructured":"Object Management Group. 2019. DDS Vendor directory Listing. Retrieved November 21, 2023 from https:\/\/www.omg.org\/dds-directory\/vendor\/list.htm"},{"key":"e_1_3_2_1_20_1","volume-title":"Retrieved","author":"Object Management Group","year":"2022","unstructured":"Object Management Group. 2022. DDS Interoperability Wire Protocol Version 2.5. Retrieved November 21, 2023 from https:\/\/www.omg.org\/spec\/DDSI-RTPS"},{"key":"e_1_3_2_1_21_1","volume-title":"Retrieved","author":"Object Management Group","year":"2023","unstructured":"Object Management Group. 2023. DDS in Other Standards. Retrieved November 21, 2023 from https:\/\/www.dds-foundation.org\/dds-in-other-standards\/"},{"key":"e_1_3_2_1_22_1","volume-title":"Retrieved","author":"Object Management Group","year":"2023","unstructured":"Object Management Group. 2023. OMG Standards for Industries. Retrieved November 21, 2023 from https:\/\/www.omg.org\/industries\/index.htm"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110309"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_47"},{"key":"e_1_3_2_1_25_1","volume-title":"Retrieved","author":"Lawrence David","year":"2016","unstructured":"David Lawrence and Dwayne Bradley. 2016. Microgrids, OpenFMB and DDS at Duke Energy. Retrieved November 21, 2023 from https:\/\/community.rti.com\/presentation\/microgrids-openfmb-and-dds-duke-energy"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11587552_13"},{"key":"e_1_3_2_1_27_1","volume-title":"A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications","author":"Lin Jie","year":"2017","unstructured":"Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, and Wei Zhao. 2017. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE internet of things journal 4, 5 (2017), 1125--1142."},{"key":"e_1_3_2_1_28_1","volume-title":"2018 16th ACM\/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE). IEEE, 1--5.","author":"Liu Yanan","year":"2018","unstructured":"Yanan Liu, Yong Guan, Xiaojuan Li, Rui Wang, and Jie Zhang. 2018. Formal analysis and verification of DDS in ROS2. In 2018 16th ACM\/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE). IEEE, 1--5."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/646480.693776"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/794197.795075"},{"key":"e_1_3_2_1_31_1","volume-title":"Robot Operating System 2: Design, architecture, and uses in the wild. Science Robotics 7, 66","author":"Macenski Steven","year":"2022","unstructured":"Steven Macenski, Tully Foote, Brian Gerkey, Chris Lalancette, and William Woodall. 2022. Robot Operating System 2: Design, architecture, and uses in the wild. Science Robotics 7, 66 (2022), eabm6074."},{"key":"e_1_3_2_1_32_1","volume-title":"A Security Analysis of the Data Distribution Service (DDS) Protocol. Trend Micro Research","author":"Maggi Federico","year":"2022","unstructured":"Federico Maggi, Rainer Vosseler, Mars Cheng, Patrick Kuo, Chizuru Toyama, T Yen, and E Boasson V Vilches. 2022. A Security Analysis of the Data Distribution Service (DDS) Protocol. Trend Micro Research, Inc., Japan (2022), 15--20."},{"key":"e_1_3_2_1_33_1","volume-title":"2018 13th International conference on malicious and unwanted software (MALWARE). IEEE, 68--77","author":"Michaud Michael James","year":"2018","unstructured":"Michael James Michaud, Thomas Dean, and Sylvain P Leblanc. 2018. Attacking OMG data distribution service (DDS) based real-time mission critical distributed systems. In 2018 13th International conference on malicious and unwanted software (MALWARE). IEEE, 68--77."},{"volume-title":"Retrieved","year":"2017","key":"e_1_3_2_1_34_1","unstructured":"Nessus. 2017. rti-connext-dds-2017-A-0097. Retrieved November 21, 2023 from https:\/\/www.tenable.com\/plugins\/nessus\/99476"},{"key":"e_1_3_2_1_35_1","first-page":"2021","volume-title":"Retrieved","author":"NIST.","year":"2022","unstructured":"NIST. 2022. CVE-2021-38435. Retrieved November 21, 2023 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-38435"},{"key":"e_1_3_2_1_36_1","first-page":"2021","volume-title":"Retrieved","author":"NIST.","year":"2022","unstructured":"NIST. 2022. CVE-2021-38443. Retrieved November 21, 2023 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-38443"},{"key":"e_1_3_2_1_37_1","first-page":"2021","volume-title":"Retrieved","author":"NIST.","year":"2022","unstructured":"NIST. 2022. CVE-2021-38447. Retrieved November 21, 2023 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-38447"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467823"},{"key":"e_1_3_2_1_39_1","volume-title":"International conference on application and theory of petri nets. Springer, 450--462","author":"Ratzer Anne Vinter","year":"2003","unstructured":"Anne Vinter Ratzer, Lisa Wells, Henry Michael Lassen, Mads Laursen, Jacob Frank Qvortrup, Martin Stig Stissing, Michael Westergaard, S\u00f8ren Christensen, and Kurt Jensen. 2003. CPN tools for editing, simulating, and analysing coloured Petri nets. In International conference on application and theory of petri nets. Springer, 450--462."},{"key":"e_1_3_2_1_40_1","volume-title":"Retrieved","author":"RTI.","year":"2023","unstructured":"RTI. 2023. Connext Product Suite. Retrieved November 21, 2023 from https:\/\/www.rti.com\/products"},{"key":"e_1_3_2_1_41_1","volume-title":"Retrieved","author":"Saull Richard","year":"2020","unstructured":"Richard Saull. 2020. DDS Use Case: Generic Vehicle Architecture (GVA). Retrieved November 20, 2023 from https:\/\/www.brighttalk.com\/webcast\/12231\/443332"},{"key":"e_1_3_2_1_42_1","first-page":"4","article-title":"Toward a safe and secure medical Internet of Things","volume":"2","author":"Soroush Hamed","year":"2016","unstructured":"Hamed Soroush, David Arney, and Julian Goldman. 2016. Toward a safe and secure medical Internet of Things. IIC J. Innov 2, 1 (2016), 4--18.","journal-title":"IIC J. Innov"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2009.32"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3372197"},{"key":"e_1_3_2_1_45_1","volume-title":"2019 IEEE European symposium on security and privacy workshops (EUROS&PW). IEEE, 57--66","author":"White Ruffin","year":"2019","unstructured":"Ruffin White, Gianluca Caiazza, Chenxu Jiang, Xinyue Ou, Zhiyue Yang, Agostino Cortesi, and Henrik Christensen. 2019. Network reconnaissance and vulnerability excavation of secure DDS systems. In 2019 IEEE European symposium on security and privacy workshops (EUROS&PW). IEEE, 57--66."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.4225\/75\/5a84fcff95b52"}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"ASIA CCS '24"},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3656288","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:07Z","timestamp":1750290247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3656288"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":45,"alternative-id":["10.1145\/3634737.3656288","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3656288","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}