{"id":"https://openalex.org/W3111975409","doi":"https://doi.org/10.1145/3427228.3427293","title":"Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices","display_name":"Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices","publication_year":2020,"publication_date":"2020-12-07","ids":{"openalex":"https://openalex.org/W3111975409","doi":"https://doi.org/10.1145/3427228.3427293","mag":"3111975409"},"language":"en","primary_location":{"id":"doi:10.1145/3427228.3427293","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427293","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067274985","display_name":"Kuniyasu Suzaki","orcid":"https://orcid.org/0000-0003-0912-0087"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kuniyasu Suzaki","raw_affiliation_strings":["National Institute of Advanced Industrial Science and Technology, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Advanced Industrial Science and Technology, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102897632","display_name":"Akira Tsukamoto","orcid":"https://orcid.org/0000-0002-3339-7177"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Akira Tsukamoto","raw_affiliation_strings":["National Institute of Advanced Industrial Science and Technology, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Advanced Industrial Science and Technology, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Andy Green","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Andy Green","raw_affiliation_strings":["Warmcat"],"affiliations":[{"raw_affiliation_string":"Warmcat","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055898168","display_name":"Mohammad Mannan","orcid":"https://orcid.org/0000-0002-9630-5858"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammad Mannan","raw_affiliation_strings":["Concordia University, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University, Canada","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067274985"],"corresponding_institution_ids":["https://openalex.org/I73613424"],"apc_list":null,"apc_paid":null,"fwci":2.4978,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.90861988,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"428","last_page":"441"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reboot","display_name":"Reboot","score":0.7835705280303955},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7772811651229858},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7608875632286072},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.6925983428955078},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6298728585243225},{"id":"https://openalex.org/keywords/sandbox","display_name":"Sandbox (software development)","score":0.5336480736732483},{"id":"https://openalex.org/keywords/trusted-platform-module","display_name":"Trusted Platform Module","score":0.5328837633132935},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5089206695556641},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.48470258712768555},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4780762195587158},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43732428550720215},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4205317199230194},{"id":"https://openalex.org/keywords/replication","display_name":"Replication (statistics)","score":0.4101168215274811},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14734995365142822}],"concepts":[{"id":"https://openalex.org/C120524526","wikidata":"https://www.wikidata.org/wiki/Q1709148","display_name":"Reboot","level":2,"score":0.7835705280303955},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7772811651229858},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7608875632286072},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.6925983428955078},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6298728585243225},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.5336480736732483},{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.5328837633132935},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5089206695556641},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.48470258712768555},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4780762195587158},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43732428550720215},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4205317199230194},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.4101168215274811},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14734995365142822},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3427228.3427293","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427293","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":70,"referenced_works":["https://openalex.org/W73598622","https://openalex.org/W89672345","https://openalex.org/W120748129","https://openalex.org/W147819238","https://openalex.org/W1586728091","https://openalex.org/W1970914644","https://openalex.org/W1998009565","https://openalex.org/W2007210734","https://openalex.org/W2009033060","https://openalex.org/W2019731328","https://openalex.org/W2046036463","https://openalex.org/W2065085847","https://openalex.org/W2113032636","https://openalex.org/W2113103747","https://openalex.org/W2116085955","https://openalex.org/W2117882778","https://openalex.org/W2117962540","https://openalex.org/W2128182542","https://openalex.org/W2135162105","https://openalex.org/W2138247393","https://openalex.org/W2140991542","https://openalex.org/W2151725765","https://openalex.org/W2154592045","https://openalex.org/W2158699246","https://openalex.org/W2168638779","https://openalex.org/W2168872572","https://openalex.org/W2188644404","https://openalex.org/W2329076814","https://openalex.org/W2341044320","https://openalex.org/W2350778671","https://openalex.org/W2416799949","https://openalex.org/W2569698171","https://openalex.org/W2579632738","https://openalex.org/W2586432806","https://openalex.org/W2587466508","https://openalex.org/W2604442880","https://openalex.org/W2606525299","https://openalex.org/W2612380866","https://openalex.org/W2617928660","https://openalex.org/W2733765803","https://openalex.org/W2734941459","https://openalex.org/W2736463401","https://openalex.org/W2744588164","https://openalex.org/W2748868501","https://openalex.org/W2751512711","https://openalex.org/W2751696670","https://openalex.org/W2752858240","https://openalex.org/W2773615984","https://openalex.org/W2784212229","https://openalex.org/W2792029037","https://openalex.org/W2798916184","https://openalex.org/W2883613460","https://openalex.org/W2888774481","https://openalex.org/W2889351621","https://openalex.org/W2901508923","https://openalex.org/W2903284432","https://openalex.org/W2907538810","https://openalex.org/W2913096406","https://openalex.org/W2920921666","https://openalex.org/W2943459218","https://openalex.org/W2950865323","https://openalex.org/W2954224917","https://openalex.org/W2955342536","https://openalex.org/W2963311060","https://openalex.org/W2967994413","https://openalex.org/W3016246341","https://openalex.org/W3047022590","https://openalex.org/W4236487618","https://openalex.org/W4236786653","https://openalex.org/W6753443810"],"related_works":["https://openalex.org/W2347997421","https://openalex.org/W2484510436","https://openalex.org/W2033352828","https://openalex.org/W2294483539","https://openalex.org/W3208250511","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W2034129977","https://openalex.org/W1745773915","https://openalex.org/W2765820957"],"abstract_inverted_index":{"Many":[0],"IoT":[1,58],"devices":[2],"are":[3,10],"geographically":[4],"distributed":[5],"without":[6],"human":[7],"administrators,":[8],"which":[9],"maintained":[11],"by":[12],"a":[13,53],"remote":[14,30],"server":[15],"to":[16,47,65,68,79,93],"enforce":[17],"security":[18],"updates,":[19],"ideally":[20],"through":[21],"machine-to-machine":[22],"(M2M)":[23],"management.":[24],"However,":[25],"malware":[26],"often":[27],"terminates":[28],"the":[29,38,57,75,84],"control":[31],"mechanism":[32],"immediately":[33],"after":[34,83],"compromise":[35],"and":[36,49],"hijacks":[37],"device":[39,43,59,76,91],"completely.":[40],"The":[41],"compromised":[42],"has":[44],"no":[45],"way":[46],"recover":[48],"becomes":[50],"part":[51],"of":[52,86],"botnet.":[54],"Even":[55],"if":[56],"remains":[60],"uncompromised,":[61],"it":[62],"is":[63,77],"required":[64],"update":[66],"due":[67],"recall":[69],"or":[70,90],"other":[71],"reasons.":[72],"In":[73],"addition,":[74],"desired":[78],"be":[80],"automatically":[81],"disposable":[82],"expiration":[85],"its":[87],"service,":[88],"software,":[89],"hardware":[92],"prevent":[94],"being":[95],"cyber":[96],"debris.":[97]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
