{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T11:25:07Z","timestamp":1765538707261,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","funder":[{"name":"Christian Doppler Forschungsgesellschaft (CDG)","award":["JRZ for IoT Security"],"award-info":[{"award-number":["JRZ for IoT Security"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,18]]},"DOI":"10.1145\/3770501.3770509","type":"proceedings-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T11:20:16Z","timestamp":1765538416000},"page":"59-67","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Meta Device Model for Automated Security Assessment of Internet of Things Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5224-6359","authenticated-orcid":false,"given":"Christoph","family":"Egger","sequence":"first","affiliation":[{"name":"Josef Ressel Centre for Security, Analysis of IoT Devices, MCI - The Entrepreneurial School, Innsbruck, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6968-295X","authenticated-orcid":false,"given":"Matthias","family":"Janetschek","sequence":"additional","affiliation":[{"name":"Josef Ressel Centre for Security, Analysis of IoT Devices, MCI - The Entrepreneurial School, Innsbruck, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6967-8800","authenticated-orcid":false,"given":"Martin","family":"Nocker","sequence":"additional","affiliation":[{"name":"Josef Ressel Centre for Security, Analysis of IoT Devices, MCI - The Entrepreneurial School, Innsbruck, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3562-5265","authenticated-orcid":false,"given":"Florian","family":"Merkle","sequence":"additional","affiliation":[{"name":"Josef Ressel Centre for Security, Analysis of IoT Devices, MCI - The Entrepreneurial School, Innsbruck, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8710-9188","authenticated-orcid":false,"given":"Pascal","family":"Sch\u00f6ttle","sequence":"additional","affiliation":[{"name":"Josef Ressel Centre for Security, Analysis of IoT Devices, MCI - The Entrepreneurial School, Innsbruck, Austria"}]}],"member":"320","published-online":{"date-parts":[[2025,12,12]]},"reference":[{"key":"e_1_3_3_2_2_2","first-page":"1","volume-title":"Advances in Computers","author":"Ahmad Abbas","year":"2018","unstructured":"Abbas Ahmad, Fabrice Bouquet, Elizabeta Fourneret, and Bruno Legeard. 2018. Model-based testing for internet of things systems. In Advances in Computers. Vol.\u00a0108. Elsevier, 1\u201358."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Mahmoud Ammar Giovanni Russello and Bruno Crispo. 2018. Internet of Things: A survey on the security of IoT frameworks. Journal of information security and Applications 38 (2018) 8\u201327.","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40403-0"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40403-0_8"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/2755567.2755569"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Tom\u00e1s Dom\u00ednguez-Bola\u00f1o Omar Campos Valent\u00edn Barral Carlos\u00a0J Escudero and Jos\u00e9\u00a0A Garc\u00eda-Naya. 2022. An overview of IoT architectures technologies and existing open-source projects. Internet of Things 20 (2022) 100626.","DOI":"10.1016\/j.iot.2022.100626"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15008-1_12"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Michael Felderer Philipp Zech Ruth Breu Matthias B\u00fcchler and Alexander Pretschner. 2016. Model-based security testing: a taxonomy and systematic classification. Software testing verification and reliability 26 2 (2016) 119\u2013148.","DOI":"10.1002\/stvr.1580"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Jasmin Guth Uwe Breitenb\u00fccher Michael Falkenthal Paul Fremantle Oliver Kopp Frank Leymann and Lukas Reinfurt. 2018. A detailed analysis of IoT platform architectures: Concepts similarities and differences. Internet of everything: algorithms methodologies technologies and perspectives (2018) 81\u2013101.","DOI":"10.1007\/978-981-10-5861-5_4"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/CIOT.2016.7872918"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","unstructured":"Institute of Electrical and Electronics Engineers. 2020. IEEE Standard for an Architectural Framework for the Internet of Things (IoT). IEEE Std 2413-2019 (2020) 1\u2013269. 10.1109\/IEEESTD.2020.9032420","DOI":"10.1109\/IEEESTD.2020.9032420"},{"key":"e_1_3_3_2_13_2","unstructured":"International Electrotechnical Commission and International Organization for Standardization. 2024. Internet of Things (IoT) \u2013 Reference architecture. ISO\/IEC 30141:2024 (August 2024) 53. https:\/\/www.iso.org\/standard\/88800.html Second edition cancels and replaces the first edition ISO\/IEC 30141:2018."},{"key":"#cr-split#-e_1_3_3_2_14_2.1","unstructured":"International Organization for Standardization and International Electrotechnical Commission. 1994. ISO\/IEC 7498-1:1994"},{"key":"#cr-split#-e_1_3_3_2_14_2.2","unstructured":"(E) - Information technology - Open Systems Interconnection - Basic Reference Model: The Basic Model. https:\/\/www.iso.org\/standard\/20269.html. Also published as ITU-T Recommendation X.200 (1994)."},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.5220\/0012345900003648"},{"key":"e_1_3_3_2_16_2","unstructured":"Ted Kurmaku and Musa Kumrija. 2020. A systematic literature review and meta-analysis comparing automated test generation and manual testing. (2020)."},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Francesca Lonetti Antonia Bertolino and Felicita Di\u00a0Giandomenico. 2023. Model-based security testing in IoT systems: A Rapid Review. Information and Software Technology 164 (2023) 107326.","DOI":"10.1016\/j.infsof.2023.107326"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.29"},{"key":"e_1_3_3_2_19_2","unstructured":"Eric Prud\u2019hommeaux and Andy Seaborne. 2008. SPARQL Query Language for RDF. W3C Recommendation. https:\/\/www.w3.org\/TR\/rdf-sparql-query\/ Accessed: 2025\/10\/03 09:28:31."},{"key":"e_1_3_3_2_20_2","unstructured":"Data Bridge\u00a0Market Research. 2021. Global Consumer IoT Market \u2013 Industry Trends and Forecast to 2028. Industry report on consumer IoT market trends and forecast to 2028."},{"key":"e_1_3_3_2_21_2","first-page":"635","volume-title":"International conference of reliable information and communication technology","author":"Saemaldahr Raghdah","year":"2020","unstructured":"Raghdah Saemaldahr, Bijayita Thapa, Kristopher Maikoo, and Eduardo\u00a0B Fernandez. 2020. Reference Architectures for the IoT: A survey. In International conference of reliable information and communication technology. Springer, 635\u2013646."},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.80.1"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2504.06712"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Hannelore Sebestyen Daniela\u00a0Elena Popescu and Rodica\u00a0Doina Zmaranda. 2025. A literature review on security in the Internet of Things: Identifying and analysing critical categories. Computers 14 2 (2025) 61.","DOI":"10.3390\/computers14020061"},{"key":"e_1_3_3_2_25_2","unstructured":"Shape Expressions Community Group. 2019. Shape Expressions Language 2.1. W3C Community Group Report. https:\/\/shex.io\/shex-semantics\/ Accessed: 2025-07-16."},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"#cr-split#-e_1_3_3_2_27_2.1","unstructured":"The European Union. 2024. Regulation of the European Parlament and of the Council on horizontal cybersecurity requirements for products with digital elements and amending Regulations (EU) No 168\/2013 and (EU) 2019\/1020 and Directive (EU) 2020\/1828 (Cyber Resilience Act). 25 September 2024 version adopted by the European Council on 10 October 2024 available at: https:\/\/data.consilium.europa.eu\/doc\/document\/PE-100-2023-INIT\/en\/pdf"},{"key":"#cr-split#-e_1_3_3_2_27_2.2","doi-asserted-by":"crossref","unstructured":"Last accessed on 2025\/10\/03 09:28:31.","DOI":"10.47001\/IRJIET\/2025.903004"},{"key":"e_1_3_3_2_28_2","unstructured":"The OWASP Foundation. 2024. IoT Security Testing Guide. Online available at: https:\/\/owasp.org\/owasp-istg\/; Accessed: 2025\/10\/03 09:28:31."},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Mark Utting Alexander Pretschner and Bruno Legeard. 2012. A taxonomy of model-based testing approaches. Software Testing Verification and Reliability 22 5 (2012) 297\u2013312.","DOI":"10.1002\/stvr.456"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","unstructured":"Leonardo Villalobos-Arias Christan Quesada-L\u00f3pez Alexandra Martinez and Marcelo Jenkins. 2019. Model-based testing areas tools and challenges: A tertiary study. CLEI Electronic Journal 22 1 (2019) 3\u20131.","DOI":"10.19153\/cleiej.22.1.3"},{"key":"e_1_3_3_2_31_2","unstructured":"W3C OWL Working Group. 2012. OWL 2 \u2013 Web Ontology Language Document Overview (Second Edition). https:\/\/www.w3.org\/TR\/owl2-overview\/. Accessed: 2025-03-25."},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Michael Weyrich and Christof Ebert. 2015. Reference architectures for the Internet of Things. IEEE Software 33 1 (2015) 112\u2013116.","DOI":"10.1109\/MS.2016.20"},{"key":"e_1_3_3_2_33_2","unstructured":"World Wide Web Consortium. 2017. SHACL - Shapes Constraint Language. W3C Recommendation. https:\/\/www.w3.org\/TR\/shacl\/ Accessed: 2025-07-16."}],"event":{"name":"IOT 2025: The 15th International Conference on the Internet of Things","location":"Vienna Austria","acronym":"IOT 2025"},"container-title":["Proceedings of the 15th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3770501.3770509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T11:20:29Z","timestamp":1765538429000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3770501.3770509"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,18]]},"references-count":34,"alternative-id":["10.1145\/3770501.3770509","10.1145\/3770501"],"URL":"https:\/\/doi.org\/10.1145\/3770501.3770509","relation":{},"subject":[],"published":{"date-parts":[[2025,11,18]]},"assertion":[{"value":"2025-12-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}