{"id":"https://openalex.org/W4289670770","doi":"https://doi.org/10.1145/3230833.3232807","title":"Adding Salt to Pepper","display_name":"Adding Salt to Pepper","publication_year":2018,"publication_date":"2018-08-13","ids":{"openalex":"https://openalex.org/W4289670770","doi":"https://doi.org/10.1145/3230833.3232807"},"language":"en","primary_location":{"id":"doi:10.1145/3230833.3232807","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3230833.3232807","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://orbit.dtu.dk/en/publications/a0c7988f-8db6-4fa1-bd0d-7f65eba1f75c","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004767362","display_name":"Alberto Giaretta","orcid":"https://orcid.org/0000-0001-9293-7711"},"institutions":[{"id":"https://openalex.org/I26437253","display_name":"\u00d6rebro University","ror":"https://ror.org/05kytsw45","country_code":"SE","type":"education","lineage":["https://openalex.org/I26437253"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Alberto Giaretta","raw_affiliation_strings":["Centre for Applied Autonomous Sensor Systems (AASS), \u00d6rebro University, Sweden"],"affiliations":[{"raw_affiliation_string":"Centre for Applied Autonomous Sensor Systems (AASS), \u00d6rebro University, Sweden","institution_ids":["https://openalex.org/I26437253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049334028","display_name":"Michele De Donno","orcid":"https://orcid.org/0000-0001-9056-9281"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Michele De Donno","raw_affiliation_strings":["DTU Compute, Technical University of Denmark, Denmark"],"affiliations":[{"raw_affiliation_string":"DTU Compute, Technical University of Denmark, Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006444565","display_name":"Nicola Dragoni","orcid":"https://orcid.org/0000-0001-9575-2990"},"institutions":[{"id":"https://openalex.org/I26437253","display_name":"\u00d6rebro University","ror":"https://ror.org/05kytsw45","country_code":"SE","type":"education","lineage":["https://openalex.org/I26437253"]},{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK","SE"],"is_corresponding":false,"raw_author_name":"Nicola Dragoni","raw_affiliation_strings":["DTU Compute, Technical University of Denmark, Denmark and Centre for Applied Autonomous Sensor Systems (AASS), \u00d6rebro University, Sweden"],"affiliations":[{"raw_affiliation_string":"DTU Compute, Technical University of Denmark, Denmark and Centre for Applied Autonomous Sensor Systems (AASS), \u00d6rebro University, Sweden","institution_ids":["https://openalex.org/I26437253","https://openalex.org/I96673099"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004767362"],"corresponding_institution_ids":["https://openalex.org/I26437253"],"apc_list":null,"apc_paid":null,"fwci":1.9817,"has_fulltext":true,"cited_by_count":31,"citation_normalized_percentile":{"value":0.87953325,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.7653661966323853},{"id":"https://openalex.org/keywords/robot","display_name":"Robot","score":0.6542937755584717},{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.5883651375770569},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.568296492099762},{"id":"https://openalex.org/keywords/robotics","display_name":"Robotics","score":0.5209711194038391},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.48857077956199646},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4768694043159485},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47381722927093506},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.38300377130508423},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.13492777943611145},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.10562971234321594}],"concepts":[{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.7653661966323853},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.6542937755584717},{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.5883651375770569},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.568296492099762},{"id":"https://openalex.org/C34413123","wikidata":"https://www.wikidata.org/wiki/Q170978","display_name":"Robotics","level":3,"score":0.5209711194038391},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.48857077956199646},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4768694043159485},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47381722927093506},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.38300377130508423},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.13492777943611145},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.10562971234321594},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3230833.3232807","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3230833.3232807","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/a0c7988f-8db6-4fa1-bd0d-7f65eba1f75c","is_oa":true,"landing_page_url":"https://orbit.dtu.dk/en/publications/a0c7988f-8db6-4fa1-bd0d-7f65eba1f75c","pdf_url":"https://orbit.dtu.dk/en/publications/a0c7988f-8db6-4fa1-bd0d-7f65eba1f75c","source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Giaretta , A , De Donno , M &amp; Dragoni , N 2018 , Adding salt to pepper a structured security assessment over a humanoid robot : A Structured Security Assessment over a Humanoid Robot . in Proceedings of 13th International Conference on Availability, Reliability and Security, . , 3232807 , Association for Computing Machinery , 13th International Conference on Availability, Reliability and Security , Hamburg , Hamburg , Germany , 27/08/2018 . https://doi.org/10.1145/3230833.3232807","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:publications/a0c7988f-8db6-4fa1-bd0d-7f65eba1f75c","is_oa":true,"landing_page_url":"https://orbit.dtu.dk/en/publications/a0c7988f-8db6-4fa1-bd0d-7f65eba1f75c","pdf_url":"https://orbit.dtu.dk/en/publications/a0c7988f-8db6-4fa1-bd0d-7f65eba1f75c","source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Giaretta , A , De Donno , M &amp; Dragoni , N 2018 , Adding salt to pepper a structured security assessment over a humanoid robot : A Structured Security Assessment over a Humanoid Robot . in Proceedings of 13th International Conference on Availability, Reliability and Security, . , 3232807 , Association for Computing Machinery , 13th International Conference on Availability, Reliability and Security , Hamburg , Hamburg , Germany , 27/08/2018 . https://doi.org/10.1145/3230833.3232807","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4289670770.pdf","grobid_xml":"https://content.openalex.org/works/W4289670770.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W2112736324","https://openalex.org/W2320204756","https://openalex.org/W2561521908","https://openalex.org/W2593581701","https://openalex.org/W2788455797","https://openalex.org/W2916291911","https://openalex.org/W4255981620","https://openalex.org/W4299406992"],"related_works":["https://openalex.org/W2766781562","https://openalex.org/W4205304595","https://openalex.org/W2792608345","https://openalex.org/W2979782961","https://openalex.org/W308359497","https://openalex.org/W1499596878","https://openalex.org/W3136170567","https://openalex.org/W2947769183","https://openalex.org/W26305611","https://openalex.org/W4399147188"],"abstract_inverted_index":{"The":[0,107],"rise":[1,118],"of":[2,58,79,111,119,123],"connectivity,":[3],"digitalization,":[4],"robotics,":[5],"and":[6,15,23,46,70,89],"artificial":[7],"intelligence":[8],"(AI)":[9],"is":[10,114],"rapidly":[11],"changing":[12],"our":[13],"society":[14],"shaping":[16],"its":[17],"future":[18],"development.":[19],"During":[20],"this":[21,50,112],"technological":[22],"societal":[24],"revolution,":[25],"security":[26,56,80,121],"has":[27],"been":[28],"persistently":[29],"neglected,":[30],"yet":[31],"a":[32,54,60,71,76],"hacked":[33],"robot":[34],"can":[35,83],"act":[36],"as":[37],"an":[38,68],"insider":[39],"threat":[40],"in":[41,104],"organizations,":[42],"industries,":[43],"public":[44,132],"spaces,":[45],"private":[47],"homes.":[48],"In":[49],"paper,":[51],"we":[52,94],"perform":[53],"structured":[55],"assessment":[57],"Pepper,":[59],"commercial":[61],"humanoid":[62],"robot.":[63,92],"Our":[64],"analysis,":[65],"composed":[66],"by":[67],"automated":[69],"manual":[72],"part,":[73],"points":[74],"out":[75],"relevant":[77],"number":[78],"flaws":[81],"that":[82],"be":[84,100],"used":[85],"to":[86,115],"take":[87],"over":[88],"command":[90],"the":[91,105,117,120,131],"Furthermore,":[93],"suggest":[95],"how":[96],"these":[97],"issues":[98],"could":[99],"fixed,":[101],"thus,":[102],"avoided":[103],"future.":[106],"very":[108],"final":[109],"aim":[110],"work":[113],"push":[116],"level":[122],"IoT":[124],"products":[125],"before":[126],"they":[127],"are":[128],"sold":[129],"on":[130],"market.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-08-03T00:00:00"}
