{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:40:29Z","timestamp":1730342429748,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,25]]},"DOI":"10.23919\/cnsm52442.2021.9615597","type":"proceedings-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T20:30:34Z","timestamp":1638477034000},"page":"437-445","source":"Crossref","is-referenced-by-count":0,"title":["Inferring Software Composition and Credentials of Embedded Devices from Partial Knowledge"],"prefix":"10.23919","author":[{"given":"Pierre-Marie","family":"Junges","sequence":"first","affiliation":[]},{"given":"Jerome","family":"Francois","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.013"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JCSSE.2018.8457340"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2865604"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3321408.3326671"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897900"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"ref12","article-title":"Zmap: Fast internet-wide scanning and its security applications","author":"durumeric","year":"2013","journal-title":"Security Symposium"},{"journal-title":"The Internet of Things How the next Evolution of the Internet Is Changing Everything","year":"2011","author":"evans","key":"ref13"},{"key":"ref14","article-title":"Optimizing Internet Scanning for Assessing Industrial Systems Exposure","author":"fran\u00e7ois","year":"2016","journal-title":"International Workshop on TRaffic Analysis and Charac-terization (TRAC)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390365"},{"key":"ref16","first-page":"61","article-title":"Fingerprinting tooling used for SSH compromisation attempts","author":"ghiette","year":"2019","journal-title":"22nd International Symposium on Research in Attacks Intrusions and Defenses (RAID 2019)"},{"journal-title":"METRICS FOR MULTI-CLASS CLASSIFICATION AN OVERVIEW","year":"2020","author":"grandini","key":"ref17"},{"key":"ref18","article-title":"Software-based Analysis of the Security By Design in Embedded Devices","author":"junges","year":"2021","journal-title":"IFIP\/IEEE International Symposium on Integrated Network Management"},{"key":"ref19","article-title":"Passive inference of user actions through iot gateway encrypted traffic analysis","author":"junges","year":"0","journal-title":"IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502818"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.62"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref3","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"26th USENIX Security Symposium"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352543"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266452"},{"key":"ref8","first-page":"1","author":"chen","year":"2016","journal-title":"Towards automated dynamic analysis for linux-based embedded firmware"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2933155"},{"journal-title":"Alert (ta14&#x2013;017a) - udp-based amplification attacks","year":"2019","key":"ref2"},{"key":"ref9","first-page":"95","article-title":"A large-scale analysis of the security of embedded firmwares","author":"costin","year":"0","journal-title":"23rd USENIX Security Symposium ( USENIX Security 14)"},{"journal-title":"Cyber threat intelligence report","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/sym10050151"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896696"},{"key":"ref21","first-page":"80","volume":"50","author":"kolias","year":"2017","journal-title":"DDoS in the iot Mirai and other botnets"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904364"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987415"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885429"},{"key":"ref25","article-title":"Iot sentinel: Automated device-type identification for security enforcement in iot","author":"miettinen","year":"0","journal-title":"37th International Conference on Distributed Computing Systems (ICDCS)"}],"event":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2021,10,25]]},"location":"Izmir, Turkey","end":{"date-parts":[[2021,10,29]]}},"container-title":["2021 17th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9615441\/9615442\/09615597.pdf?arnumber=9615597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T20:53:49Z","timestamp":1647896029000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615597\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":33,"URL":"https:\/\/doi.org\/10.23919\/cnsm52442.2021.9615597","relation":{},"subject":[],"published":{"date-parts":[[2021,10,25]]}}}