{"id":"https://openalex.org/W4410357439","doi":"https://doi.org/10.1145/3672608.3707869","title":"Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard","display_name":"Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard","publication_year":2025,"publication_date":"2025-03-31","ids":{"openalex":"https://openalex.org/W4410357439","doi":"https://doi.org/10.1145/3672608.3707869"},"language":"en","primary_location":{"id":"doi:10.1145/3672608.3707869","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3672608.3707869","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3672608.3707869","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3672608.3707869","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037472314","display_name":"Timm Lauser","orcid":"https://orcid.org/0009-0005-8704-5061"},"institutions":[{"id":"https://openalex.org/I107257983","display_name":"Darmstadt University of Applied Sciences","ror":"https://ror.org/047wbd030","country_code":"DE","type":"education","lineage":["https://openalex.org/I107257983"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Timm Lauser","raw_affiliation_strings":["Darmstadt University of Applied Sciences, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Darmstadt University of Applied Sciences, Darmstadt, Germany","institution_ids":["https://openalex.org/I107257983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054266595","display_name":"Maximilian M\u00fcller","orcid":null},"institutions":[{"id":"https://openalex.org/I143379178","display_name":"FZI Research Center for Information Technology","ror":"https://ror.org/04kdh6x72","country_code":"DE","type":"nonprofit","lineage":["https://openalex.org/I143379178"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Maximilian M\u00fcller","raw_affiliation_strings":["FZI Research Center for Information Technology, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"FZI Research Center for Information Technology, Karlsruhe, Germany","institution_ids":["https://openalex.org/I143379178"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007385263","display_name":"Ingmar Baumgart","orcid":"https://orcid.org/0009-0005-5535-8741"},"institutions":[{"id":"https://openalex.org/I143379178","display_name":"FZI Research Center for Information Technology","ror":"https://ror.org/04kdh6x72","country_code":"DE","type":"nonprofit","lineage":["https://openalex.org/I143379178"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ingmar Baumgart","raw_affiliation_strings":["FZI Research Center for Information Technology, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"FZI Research Center for Information Technology, Karlsruhe, Germany","institution_ids":["https://openalex.org/I143379178"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016833533","display_name":"Christoph Krau\u00df","orcid":"https://orcid.org/0000-0001-7776-7574"},"institutions":[{"id":"https://openalex.org/I107257983","display_name":"Darmstadt University of Applied Sciences","ror":"https://ror.org/047wbd030","country_code":"DE","type":"education","lineage":["https://openalex.org/I107257983"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christoph Krau\u00df","raw_affiliation_strings":["Darmstadt University of Applied Sciences, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Darmstadt University of Applied Sciences, Darmstadt, Germany","institution_ids":["https://openalex.org/I107257983"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037472314"],"corresponding_institution_ids":["https://openalex.org/I107257983"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10182797,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1839","last_page":"1848"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/redistribution","display_name":"Redistribution (election)","score":0.7400573492050171},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6240756511688232},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4946455657482147},{"id":"https://openalex.org/keywords/distribution","display_name":"Distribution (mathematics)","score":0.41994738578796387},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3591753840446472},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.06760978698730469},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.059662967920303345}],"concepts":[{"id":"https://openalex.org/C74080474","wikidata":"https://www.wikidata.org/wiki/Q7305975","display_name":"Redistribution (election)","level":3,"score":0.7400573492050171},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6240756511688232},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4946455657482147},{"id":"https://openalex.org/C110121322","wikidata":"https://www.wikidata.org/wiki/Q865811","display_name":"Distribution (mathematics)","level":2,"score":0.41994738578796387},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3591753840446472},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.06760978698730469},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.059662967920303345},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3672608.3707869","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3672608.3707869","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3672608.3707869","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3672608.3707869","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3672608.3707869","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3672608.3707869","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6013046030","display_name":null,"funder_award_id":"101083994","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8051717526","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410357439.pdf","grobid_xml":"https://content.openalex.org/works/W4410357439.grobid-xml"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W2029693536","https://openalex.org/W2080043453","https://openalex.org/W3021055729","https://openalex.org/W3111699215","https://openalex.org/W3171824641","https://openalex.org/W3194562905","https://openalex.org/W4400121159"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2080866340","https://openalex.org/W2390279801","https://openalex.org/W2519031001","https://openalex.org/W2002725676","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4409144983"],"abstract_inverted_index":{"The":[0],"Data":[1],"Distribution":[2],"Service":[3],"(DDS)":[4],"is":[5],"a":[6,46,54],"popular":[7],"communication":[8],"middleware":[9],"for":[10],"the":[11,23,33,38,50,68],"Internet":[12],"of":[13,61],"Things":[14],"(IoT),":[15],"providing":[16],"its":[17],"own":[18],"security":[19],"mechanisms":[20],"specified":[21],"in":[22,42,49,67],"DDS":[24],"Security":[25],"standard.":[26],"In":[27],"this":[28],"work,":[29],"we":[30],"formally":[31],"analyze":[32],"authentication":[34],"handshake":[35],"protocol":[36],"and":[37,63],"encryption":[39,51],"algorithm":[40],"used":[41],"DDS.":[43],"We":[44],"discover":[45],"replay":[47],"vulnerability":[48],"algorithm,":[52],"implement":[53],"proof-of-concept":[55],"attack":[56],"on":[57],"an":[58],"open-source":[59],"implementation":[60],"DDS,":[62],"review":[64],"security-relevant":[65],"changes":[66],"recently":[69],"published":[70],"version":[71],"1.2.":[72]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
