{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:53:00Z","timestamp":1761745980316,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS1860"],"award-info":[{"award-number":["16KIS1860"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Bundesministerium f\u00fcr Wirtschaft und Energie","doi-asserted-by":"publisher","award":["20D2116B","19S23002E","19A23009F"],"award-info":[{"award-number":["20D2116B","19S23002E","19A23009F"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3664479","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Hardware Trust Anchor Authentication for Updatable IoT Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3866-1360","authenticated-orcid":false,"given":"Dominik","family":"Lorych","sequence":"first","affiliation":[{"name":"Fraunhofer SIT | ATHENE, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7404-5349","authenticated-orcid":false,"given":"Christian","family":"Plappert","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT | ATHENE, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. RIOT OS. https:\/\/www.riot-os.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"1997. HMAC: Keyed-Hashing for Message Authentication. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/rfc2104"},{"key":"e_1_3_2_1_3_1","unstructured":"Arm. 2023. MbedTLS. https:\/\/www.trustedfirmware.org\/projects\/mbed-tls. Accessed: 2023-03-16."},{"key":"e_1_3_2_1_4_1","unstructured":"Arm. 2023. suit-tool. https:\/\/gitlab.arm.com\/research\/ietf-suit\/suit-tool. Accessed: 2023-04-12."},{"volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"Bellare Mihir","key":"e_1_3_2_1_5_1","unstructured":"Mihir Bellare, Ran Canetti, and Hugo Krawczyk. 1996. Keying Hash Functions for Message Authentication. In Advances in Cryptology \u2014 CRYPTO \u201996, Neal Koblitz (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1\u201315."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"Carsten Bormann and Paul\u00a0E. Hoffman. 2020. Concise Binary Object Representation (CBOR). RFC 8949. https:\/\/doi.org\/10.17487\/RFC8949","DOI":"10.17487\/RFC8949"},{"key":"e_1_3_2_1_7_1","unstructured":"Paul England Andrey Marochko Dennis Mattoon Rob Spiger Stefan Thom and David Wooten. 2016. RIoT - A Foundation for Trust in the Internet of Things. Technical Report MSR-TR-2016-18. https:\/\/www.microsoft.com\/en-us\/research\/publication\/riot-a-foundation-for-trust-in-the-internet-of-things\/"},{"key":"e_1_3_2_1_8_1","unstructured":"Robert Escherich Ingo Ledendecker Carsten Schmal Burkhard Kuhls Christian Grothe and Frank Scharberth. 2009. SHE \u2013 Secure Hardware Extension Functional Specification Version 1.1 Rev: 439. Technical Report."},{"key":"e_1_3_2_1_9_1","unstructured":"Trusted\u00a0Computing Group. 2018. Hardware Requirements for a Device Identifier Composition Engine. Technical Report. Trusted Computing Group."},{"key":"e_1_3_2_1_10_1","unstructured":"Trusted\u00a0Computing Group. 2018. Implicit Identity Based Device Attestation. Technical Report. Trusted Computing Group."},{"key":"e_1_3_2_1_11_1","first-page":"59","article-title":"Trusted Platform Module Library Specification, Family \u201c2.0","volume":"01","author":"Trusted\u00a0Computing Group","year":"2019","unstructured":"Trusted\u00a0Computing Group. 2019. Trusted Platform Module Library Specification, Family \u201c2.0\u201d, Level 00, Revision 01.59. Technical Report. Trusted Computing Group.","journal-title":"Level 00, Revision"},{"key":"e_1_3_2_1_12_1","unstructured":"Trusted\u00a0Computing Group. 2020. DICE Layering Architecture. Technical Report. Trusted Computing Group."},{"key":"e_1_3_2_1_13_1","unstructured":"Trusted\u00a0Computing Group. 2020. Symmetric Identity Based Device Attestation. Technical Report."},{"key":"e_1_3_2_1_14_1","unstructured":"Trusted\u00a0Computing Group. 2021. DICE Attestation Architecture. Technical Report. Trusted Computing Group."},{"key":"e_1_3_2_1_15_1","unstructured":"Trusted\u00a0Computing Group. 2022. DICE Endorsement Architecture for Devices. Technical Report. Trusted Computing Group."},{"key":"e_1_3_2_1_16_1","unstructured":"Trusted\u00a0Computing Group. 2023. DICE Protection Environment. Technical Report. Public Review."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/diss.2018.23011"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3508398.3511507"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384723"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlamp.2022.100812"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2778751"},{"key":"e_1_3_2_1_22_1","unstructured":"Paolo Matarazzo and Vinay Pamnani. 2023. BitLocker Countermeasures. https:\/\/learn.microsoft.com\/en-us\/windows\/security\/operating-system-security\/data-protection\/bitlocker\/bitlocker-countermeasures."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Brendan Moran Hannes Tschofenig and Henk Birkholz. 2022. A Manifest Information Model for Firmware Updates in Internet of Things (IoT) Devices. RFC 9124. https:\/\/doi.org\/10.17487\/RFC9124","DOI":"10.17487\/RFC9124"},{"key":"e_1_3_2_1_24_1","unstructured":"Brendan Moran Hannes Tschofenig Henk Birkholz Koen Zandberg and \u00d8yvind R\u00f8nningstad. 2023. A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest. Internet-Draft draft-ietf-suit-manifest-22. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-suit-manifest\/22\/ Work in Progress."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","unstructured":"Brendan Moran Hannes Tschofenig David Brown and Milosch Meriac. 2021. A Firmware Update Architecture for Internet of Things. RFC 9019. https:\/\/doi.org\/10.17487\/RFC9019","DOI":"10.17487\/RFC9019"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103514"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","unstructured":"Jim Schaad. 2017. CBOR Object Signing and Encryption (COSE). RFC 8152. https:\/\/doi.org\/10.17487\/RFC8152","DOI":"10.17487\/RFC8152"},{"key":"e_1_3_2_1_28_1","unstructured":"Secom. [n. d.]. libcsuit. https:\/\/github.com\/kentakayama\/libcsuit. Accessed: 2023-04-12."},{"key":"e_1_3_2_1_29_1","unstructured":"OMA SpecWorks. [n. d.]. LightweightM2M. https:\/\/technical.openmobilealliance.org\/index.html. Accessed: 2023-04-12."},{"key":"e_1_3_2_1_30_1","volume-title":"Information Security and Cryptology - ICISC","author":"Wolf Marko","year":"2011","unstructured":"Marko Wolf and Timo Gendrullis. 2012. Design, Implementation, and Evaluation of a Vehicular Hardware Security Module. In Information Security and Cryptology - ICISC 2011, Howon Kim (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 302\u2013318."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00084"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919760"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664479","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3664479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:50:40Z","timestamp":1755881440000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664479"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":32,"alternative-id":["10.1145\/3664476.3664479","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3664479","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}