{"id":"https://openalex.org/W4400977420","doi":"https://doi.org/10.1145/3664476.3670469","title":"A tool for IoT Firmware Certification","display_name":"A tool for IoT Firmware Certification","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400977420","doi":"https://doi.org/10.1145/3664476.3670469"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3670469","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3664476.3670469","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111268516","display_name":"Giuseppe Marco Bianco","orcid":null},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Giuseppe Marco Bianco","raw_affiliation_strings":["Department of Control and Computer Engineering, Politecnico di Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Control and Computer Engineering, Politecnico di Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040165772","display_name":"Luca Ardito","orcid":"https://orcid.org/0000-0002-0501-7886"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luca Ardito","raw_affiliation_strings":["Department of Control and Computer Engineering, Politecnico di Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Control and Computer Engineering, Politecnico di Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005988766","display_name":"Michele Valsesia","orcid":"https://orcid.org/0000-0001-5869-9334"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Michele Valsesia","raw_affiliation_strings":["Department of Control and Computer Engineering, Politecnico di Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Control and Computer Engineering, Politecnico di Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5111268516"],"corresponding_institution_ids":["https://openalex.org/I177477856"],"apc_list":null,"apc_paid":null,"fwci":1.4942,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.82272314,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.9172029495239258},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.8126555681228638},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6830167770385742},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5932779312133789},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4083636403083801},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3333118259906769},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.31290221214294434}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.9172029495239258},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.8126555681228638},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6830167770385742},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5932779312133789},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4083636403083801},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3333118259906769},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.31290221214294434},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3664476.3670469","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3664476.3670469","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2213567960","https://openalex.org/W2575270978","https://openalex.org/W2888581666","https://openalex.org/W2900831546","https://openalex.org/W2968134602","https://openalex.org/W2997998108","https://openalex.org/W3015471529","https://openalex.org/W3034175800","https://openalex.org/W4213455721","https://openalex.org/W4287511941","https://openalex.org/W4294811443","https://openalex.org/W4311465492","https://openalex.org/W4378373404","https://openalex.org/W4387973268","https://openalex.org/W4391099804"],"related_works":["https://openalex.org/W2582981600","https://openalex.org/W4389238932","https://openalex.org/W4387467152","https://openalex.org/W3010413952","https://openalex.org/W4212885212","https://openalex.org/W4379115910","https://openalex.org/W4253989935","https://openalex.org/W2810560948","https://openalex.org/W2070793896","https://openalex.org/W2354251310"],"abstract_inverted_index":{"The":[0,125],"rapid":[1],"growth":[2],"of":[3,6,24,122,131,170,187,222],"the":[4,67,119,129,136,141,150,157,161,166,205,220],"Internet":[5],"Things":[7],"(IoT)":[8],"has":[9,183],"created":[10],"a":[11,94,123,171,179],"fragmented":[12],"ecosystem,":[13],"with":[14,156,195],"no":[15],"clear":[16],"rules":[17],"for":[18],"security":[19,38,167,221],"and":[20,64,88,168,208],"reliability.":[21],"This":[22,91,111],"lack":[23],"standardization":[25],"makes":[26],"IoT":[27,32,68,72,224],"devices":[28],"vulnerable":[29],"to":[30,43,56,113,117,165,217],"attacks.":[31],"firmware":[33,102],"certification":[34],"can":[35],"address":[36],"these":[37],"concerns.":[39],"It":[40],"empowers":[41],"consumers":[42],"make":[44],"informed":[45],"choices":[46],"by":[47,104],"readily":[48],"identifying":[49,101],"secure":[50,58],"products.":[51],"Additionally,":[52],"it":[53],"incentivizes":[54],"developers":[55],"prioritize":[57],"coding":[59],"practices,":[60],"ultimately":[61],"promoting":[62],"transparency":[63],"trust":[65],"within":[66],"ecosystem.":[69],"Several":[70],"existing":[71],"device":[73],"certifications":[74],"(e.g.":[75],"Cybersecurity":[76],"Assurance":[77],"Program,":[78],"British":[79],"Standards":[80],"Institution,":[81],"ioXt":[82],"Alliance)":[83],"prioritise":[84],"cybersecurity":[85],"through":[86,108],"risk":[87],"vulnerability":[89,215],"assessments.":[90],"paper":[92],"proposes":[93],"complementary":[95],"approach.":[96],"Our":[97],"tool":[98],"focuses":[99],"on":[100,203],"functionality":[103],"analysing":[105],"system":[106],"calls":[107],"static":[109],"analysis.":[110],"allows":[112],"publicly":[114],"identify":[115],"APIs":[116],"assess":[118],"actual":[120,151],"behaviour":[121,152],"firmware.":[124],"analysis":[126,147,181,216],"culminates":[127],"in":[128,154,190],"generation":[130],"JSON":[132],"manifests,":[133],"which":[134,182],"encapsulate":[135],"relevant":[137],"information":[138],"gathered":[139],"during":[140],"case":[142],"study.":[143],"In":[144],"particular,":[145],"this":[146],"verifies":[148],"whether":[149],"is":[153],"line":[155],"developer\u2019s":[158],"statements":[159],"about":[160],"device\u2019s":[162],"functionality,":[163],"contributing":[164],"reliability":[169],"device.":[172,225],"To":[173],"evaluate":[174],"tool\u2019s":[175],"performance,":[176],"we":[177],"conducted":[178],"benchmarking":[180],"demonstrated":[184],"efficient":[185],"handling":[186],"binaries":[188],"written":[189],"various":[191],"languages,":[192],"even":[193],"those":[194],"large":[196],"file":[197],"sizes.":[198],"Future":[199],"will":[200],"be":[201],"based":[202],"refining":[204],"API":[206],"search":[207],"syscall":[209],"collection":[210],"algorithms,":[211],"other":[212],"than":[213],"incorporating":[214],"further":[218],"strengthen":[219],"an":[223]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
