{"id":"https://openalex.org/W4383221310","doi":"https://doi.org/10.1145/3579856.3596442","title":"Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities","display_name":"Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities","publication_year":2023,"publication_date":"2023-07-05","ids":{"openalex":"https://openalex.org/W4383221310","doi":"https://doi.org/10.1145/3579856.3596442"},"language":"en","primary_location":{"id":"doi:10.1145/3579856.3596442","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3596442","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060351020","display_name":"Wenyuan Xu","orcid":"https://orcid.org/0000-0002-5043-9148"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenyuan Xu","raw_affiliation_strings":["Zhejiang University, China"],"raw_orcid":"https://orcid.org/0000-0002-5043-9148","affiliations":[{"raw_affiliation_string":"Zhejiang University, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5060351020"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.4484,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6640434,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7019443511962891},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6918371915817261},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6108089685440063},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5970158576965332},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5588483214378357},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4777904450893402},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.44173744320869446},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4404474198818207},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.3692460060119629},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3678274154663086},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3332459330558777},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.19533029198646545},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12467384338378906}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7019443511962891},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6918371915817261},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6108089685440063},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5970158576965332},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5588483214378357},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4777904450893402},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44173744320869446},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4404474198818207},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.3692460060119629},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3678274154663086},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3332459330558777},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.19533029198646545},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12467384338378906},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3579856.3596442","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3596442","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2141388993","https://openalex.org/W1978034799","https://openalex.org/W2999607548","https://openalex.org/W2098721272","https://openalex.org/W2956597637","https://openalex.org/W2293245356","https://openalex.org/W4225160120","https://openalex.org/W23486959","https://openalex.org/W1588942021","https://openalex.org/W2155353733"],"abstract_inverted_index":{"Vulnerabilities":[0],"pose":[1],"a":[2],"significant":[3],"challenge":[4],"in":[5,21,128,136],"ensuring":[6],"cyberse-security":[7],"for":[8],"information":[9],"systems.":[10],"In":[11],"the":[12,34,39,43,71,123],"past,":[13],"vulnerabilities":[14,127],"were":[15,109],"mainly":[16],"associated":[17],"with":[18,38,70],"functional":[19,35],"defects":[20,85,94],"system":[22],"software":[23],"and":[24,66,80,91,131],"hardware,":[25],"known":[26,114],"as":[27,115],"\"in-band":[28],"vulnerabilities,\"":[29],"whereby":[30],"\"band\"":[31],"refers":[32],"to":[33,68,89],"domain.":[36],"However,":[37],"rapid":[40],"development":[41],"of":[42,45,99,125],"Internet":[44],"Things":[46],"(IoT),":[47],"new":[48],"security":[49,119],"issues":[50],"have":[51,121],"emerged":[52],"that":[53,86,108],"traditional":[54],"vulnerability":[55],"categorization":[56],"may":[57],"not":[58,110],"fully":[59],"cover.":[60],"IoT":[61,129],"devices":[62],"rely":[63],"on":[64],"sensors":[65,100],"actuators":[67],"interact":[69],"real":[72],"world,":[73],"but":[74],"this":[75],"interaction":[76],"process":[77],"between":[78],"physical":[79],"digital":[81],"systems":[82],"has":[83],"created":[84],"are":[87],"difficult":[88],"analyze":[90],"detect.":[92],"These":[93],"include":[95],"unintentional":[96],"coupling":[97],"effects":[98],"from":[101],"ambient":[102],"analog":[103],"signals":[104],"or":[105],"abnormal":[106],"channels":[107],"intentionally":[111],"designed,":[112],"collectively":[113],"\"out-of-band":[116],"vulnerabilities.\"":[117],"Various":[118],"incidents":[120],"highlighted":[122],"prevalence":[124],"out-of-band":[126],"systems,":[130],"their":[132],"activation":[133],"can":[134],"result":[135],"serious":[137],"consequences.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
