{"id":"https://openalex.org/W2981433618","doi":"https://doi.org/10.1145/3360664.3360670","title":"Achieving Consistency of Software Updates against Strong Attackers","display_name":"Achieving Consistency of Software Updates against Strong Attackers","publication_year":2019,"publication_date":"2019-10-23","ids":{"openalex":"https://openalex.org/W2981433618","doi":"https://doi.org/10.1145/3360664.3360670","mag":"2981433618"},"language":"en","primary_location":{"id":"doi:10.1145/3360664.3360670","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3360664.3360670","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Third Central European Cybersecurity Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.25593/issn.2191-5008/cs-2019-03","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113884082","display_name":"Lamya Abdullah","orcid":null},"institutions":[{"id":"https://openalex.org/I181369854","display_name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","ror":"https://ror.org/00f7hpc57","country_code":"DE","type":"education","lineage":["https://openalex.org/I181369854"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Lamya Abdullah","raw_affiliation_strings":["Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Uniscon GmbH, Germany"],"affiliations":[{"raw_affiliation_string":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Uniscon GmbH, Germany","institution_ids":["https://openalex.org/I181369854"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058706932","display_name":"Sebastian Hahn","orcid":"https://orcid.org/0000-0002-4855-6273"},"institutions":[{"id":"https://openalex.org/I181369854","display_name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","ror":"https://ror.org/00f7hpc57","country_code":"DE","type":"education","lineage":["https://openalex.org/I181369854"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sebastian Hahn","raw_affiliation_strings":["Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Germany"],"affiliations":[{"raw_affiliation_string":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Germany","institution_ids":["https://openalex.org/I181369854"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035871932","display_name":"Felix Freiling","orcid":"https://orcid.org/0000-0002-8279-8401"},"institutions":[{"id":"https://openalex.org/I181369854","display_name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","ror":"https://ror.org/00f7hpc57","country_code":"DE","type":"education","lineage":["https://openalex.org/I181369854"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Felix Freiling","raw_affiliation_strings":["Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Germany"],"affiliations":[{"raw_affiliation_string":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Germany","institution_ids":["https://openalex.org/I181369854"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5113884082"],"corresponding_institution_ids":["https://openalex.org/I181369854"],"apc_list":null,"apc_paid":null,"fwci":0.1659,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.45795999,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8296980261802673},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.7013058662414551},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5640377402305603},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5373432040214539},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5266268849372864},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5210532546043396},{"id":"https://openalex.org/keywords/strengths-and-weaknesses","display_name":"Strengths and weaknesses","score":0.4677185118198395},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4232880771160126},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.4137412905693054},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.193992018699646},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.14160647988319397},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1398535668849945}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8296980261802673},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.7013058662414551},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5640377402305603},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5373432040214539},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5266268849372864},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5210532546043396},{"id":"https://openalex.org/C63882131","wikidata":"https://www.wikidata.org/wiki/Q17122954","display_name":"Strengths and weaknesses","level":2,"score":0.4677185118198395},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4232880771160126},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.4137412905693054},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.193992018699646},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.14160647988319397},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1398535668849945},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3360664.3360670","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3360664.3360670","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Third Central European Cybersecurity Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:aleph.bib-bvb.de:BVB01-031529858","is_oa":false,"landing_page_url":"https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-115166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"software, multimedia"},{"id":"pmh:oai:ub.uni-erlangen.de-opus:11516","is_oa":false,"landing_page_url":"https://opus4.kobv.de/opus4-fau/frontdoor/index/index/docId/11516","pdf_url":null,"source":{"id":"https://openalex.org/S4306401636","display_name":"OPUS Repository (Kooperativer Bibliotheksverbund Berlin-Brandenburg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"report"},{"id":"doi:10.25593/issn.2191-5008/cs-2019-03","is_oa":true,"landing_page_url":"https://doi.org/10.25593/issn.2191-5008/cs-2019-03","pdf_url":null,"source":{"id":"https://openalex.org/S7407052993","display_name":"Universit\u00e4tsbibliothek Erlangen-N\u00fcrnberg","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"report"}],"best_oa_location":{"id":"doi:10.25593/issn.2191-5008/cs-2019-03","is_oa":true,"landing_page_url":"https://doi.org/10.25593/issn.2191-5008/cs-2019-03","pdf_url":null,"source":{"id":"https://openalex.org/S7407052993","display_name":"Universit\u00e4tsbibliothek Erlangen-N\u00fcrnberg","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"report"},"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1545155892","https://openalex.org/W1655958391","https://openalex.org/W2034796080","https://openalex.org/W2039427951","https://openalex.org/W2055072018","https://openalex.org/W2104899073","https://openalex.org/W2263902524","https://openalex.org/W2465557945","https://openalex.org/W4233819588","https://openalex.org/W4386312073"],"related_works":["https://openalex.org/W4295769391","https://openalex.org/W2972220648","https://openalex.org/W2332667808","https://openalex.org/W1997921863","https://openalex.org/W3112960490","https://openalex.org/W93605524","https://openalex.org/W2021145421","https://openalex.org/W821271700","https://openalex.org/W3111143909","https://openalex.org/W2347476215"],"abstract_inverted_index":{"Update":[0],"systems":[1,71],"regularly":[2],"distribute":[3,50],"updates":[4,21,52],"for":[5,69,104],"installed":[6],"software":[7,37],"to":[8,24,49,98,124],"end":[9],"users.":[10],"Problems":[11],"arise":[12],"when":[13],"the":[14,36,81,89,99,105,110,115],"update":[15,70,85],"system":[16,86,116],"is":[17,44],"misused":[18],"and":[19,91,112,117,126],"malicious":[20,76],"are":[22],"sent":[23],"a":[25,63],"small":[26],"set":[27,64],"of":[28,65,83,114],"users":[29],"only.":[30],"Such":[31],"situations":[32],"can":[33],"occur":[34],"if":[35],"supplier":[38],"has":[39],"been":[40],"successfully":[41],"attacked":[42],"or":[43],"coerced":[45],"by":[46],"government":[47],"agencies":[48],"handcrafted":[51],"containing":[53],"promiscuous":[54],"functionality":[55],"like":[56],"backdoors.":[57],"In":[58],"this":[59],"paper,":[60],"we":[61],"define":[62],"general":[66],"security":[67,125],"requirements":[68,90],"that":[72,87],"encompass":[73],"protection":[74],"against":[75],"updates.":[77],"We":[78,108],"then":[79],"introduce":[80],"design":[82],"an":[84,93,96],"satisfies":[88],"present":[92],"implementation":[94],"as":[95],"extension":[97],"advanced":[100],"package":[101],"tool":[102],"(APT)":[103],"Debian":[106],"OS.":[107],"evaluate":[109],"strengths":[111],"weaknesses":[113],"discuss":[118],"its":[119],"large-scale":[120],"applicability":[121],"with":[122],"respect":[123],"performance":[127],"overhead.":[128]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
