{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:49Z","timestamp":1750309609362,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["101083994"],"award-info":[{"award-number":["101083994"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707869","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:21Z","timestamp":1747247181000},"page":"1839-1848","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-8704-5061","authenticated-orcid":false,"given":"Timm","family":"Lauser","sequence":"first","affiliation":[{"name":"Darmstadt University of Applied Sciences, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6278-3142","authenticated-orcid":false,"given":"Maximilian","family":"M\u00fcller","sequence":"additional","affiliation":[{"name":"FZI Research Center for Information Technology, Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5535-8741","authenticated-orcid":false,"given":"Ingmar","family":"Baumgart","sequence":"additional","affiliation":[{"name":"FZI Research Center for Information Technology, Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7776-7574","authenticated-orcid":false,"given":"Christoph","family":"Krau\u00df","sequence":"additional","affiliation":[{"name":"Darmstadt University of Applied Sciences, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"David Basin Cas Cremers Jannik Dreier Simon Meier Ralf Sasse and Benidikt Schmidt. 2024. Tamarin Prover. https:\/\/tamarin-prover.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Bruno Blanchet and Vincent Cheval. 2024. ProVerif: Cryptographic protocol verifier in the formal model. https:\/\/bblanche.gitlabpages.inria.fr\/proverif\/."},{"volume-title":"Computer Science Logic. Zolt\u00e1n \u00c9sik","author":"Cortier V\u00e9ronique","key":"e_1_3_2_1_3_1","unstructured":"V\u00e9ronique Cortier, Micha\u00ebl Rusinowitch, and Eugen Z\u0103linescu. 2006. Relating two standard notions of secrecy. In Computer Science Logic. Zolt\u00e1n \u00c9sik, editor. Springer Berlin Heidelberg, 303\u2013318. ISBN: 978-3-540-45459-5."},{"key":"e_1_3_2_1_4_1","volume-title":"Paper 2023\/1246.","author":"Cremers Cas","year":"2023","unstructured":"Cas Cremers, Alexander Dax, Charlie Jacomme, and Mang Zhao. 2023. Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security. Cryptology ePrint Archive, Paper 2023\/1246. (2023). https:\/\/eprint.iacr.org\/2023\/1246."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_6_1","volume-title":"TLS and DTLS. In Kommunikation und Bildverarbeitung in der Automation: Ausgew\u00e4hlte Beitr\u00e4ge der Jahreskolloquien KommA und BVAu","author":"Friesen Maxim","year":"2018","unstructured":"Maxim Friesen, Gajasri Karthikeyan, Stefan Heiss, Lukasz Wisniewski, and Henning Trsek. 2020. A comparative evaluation of security mechanisms in DDS, TLS and DTLS. In Kommunikation und Bildverarbeitung in der Automation: Ausgew\u00e4hlte Beitr\u00e4ge der Jahreskolloquien KommA und BVAu 2018. Springer Berlin Heidelberg, 201\u2013216."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.738-739.1213"},{"volume-title":"Protecting In-Vehicle Services : Security-Enabled SOME\/IP Middleware","author":"Iorio M.","key":"e_1_3_2_1_8_1","unstructured":"M. Iorio, A. Buttiglieri, M. Reineri, F. Risso, R. Sisto, and F. VALENZA. 2020. Protecting In-Vehicle Services : Security-Enabled SOME\/IP Middleware. IEEE Vehicular Technology Magazine."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3085475"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385958.3430482"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/794197.795075"},{"volume-title":"A Security Analysis of the Data Distribution Service (DDS) Protocol. Trend Micro Research","author":"Maggi Federico","key":"e_1_3_2_1_12_1","unstructured":"Federico Maggi, Rainer Vosseler, Mars Cheng, Patrick Kuo, Chizuru Toyama, T Yen, and E Boasson V Vilches. 2022. A Security Analysis of the Data Distribution Service (DDS) Protocol. Trend Micro Research, Inc., Japan, 15\u201320."},{"key":"e_1_3_2_1_13_1","volume-title":"DDS Interoperability Wire Protocol. Version 2.5. (Apr","author":"Object Management Group","year":"2022","unstructured":"Object Management Group. 2022. DDS Interoperability Wire Protocol. Version 2.5. (Apr. 2022). https:\/\/www.omg.org\/spec\/DDSI-RTPS."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/www.omg.org\/spec\/DDS-SECURITY\/1.1\/PDF","author":"Object Management Group","year":"2018","unstructured":"Object Management Group. 2018. DDS Security. Version 1.1. (2018). https:\/\/www.omg.org\/spec\/DDS-SECURITY\/1.1\/PDF."},{"key":"e_1_3_2_1_15_1","unstructured":"Object Management Group. 2024. DDS Security. Version 1.2. (June 2024). https:\/\/www.omg.org\/spec\/DDS-SECURITY\/1.2\/PDF."},{"key":"e_1_3_2_1_16_1","unstructured":"OpenDDS Foundation. 2024. OpenDDS. https:\/\/opendds.org\/."},{"key":"e_1_3_2_1_17_1","unstructured":"The Tamarin Team. 2024. Tamarin-Prover Manual - Security Protocol Analysis in the Symbolic Model. https:\/\/tamarin-prover.com\/manual\/develop\/tex\/tamarin-manual.pdf."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3656288"},{"key":"e_1_3_2_1_19_1","volume-title":"The Proceedings of 15th Australian Information Security Management Conference. C. Valli, editor","author":"White Thomas","year":"2017","unstructured":"Thomas White, Michael N. Johnstone, and Matthew Peacock. 2017. An investigation into some security issues in the DDS messaging protocol. In The Proceedings of 15th Australian Information Security Management Conference. C. Valli, editor. Edith Cowan University, Perth, Western Australia, (Dec. 2017), 132\u2013139."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465748"}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Catania International Airport Catania Italy","acronym":"SAC '25"},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707869","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:33Z","timestamp":1750298253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707869"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":20,"alternative-id":["10.1145\/3672608.3707869","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707869","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}