{"id":"https://openalex.org/W4400977527","doi":"https://doi.org/10.1145/3664476.3670940","title":"Gateway to the Danger Zone: Secure and Authentic Remote Reset in Machine Safety","display_name":"Gateway to the Danger Zone: Secure and Authentic Remote Reset in Machine Safety","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400977527","doi":"https://doi.org/10.1145/3664476.3670940"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3670940","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670940","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3664476.3670940","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039722524","display_name":"Sebastian N. Peters","orcid":"https://orcid.org/0009-0007-6421-4023"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sebastian N. Peters","raw_affiliation_strings":["TUM School of Computation, Information and Technology, Chair of IT Security, Technical University of Munich, Germany and Department Product Protection and Industrial Security, Fraunhofer AISEC, Germany"],"affiliations":[{"raw_affiliation_string":"TUM School of Computation, Information and Technology, Chair of IT Security, Technical University of Munich, Germany and Department Product Protection and Industrial Security, Fraunhofer AISEC, Germany","institution_ids":["https://openalex.org/I4210136922","https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092842148","display_name":"Nikolai Puch","orcid":"https://orcid.org/0009-0000-6259-9846"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Nikolai Puch","raw_affiliation_strings":["TUM School of Computation, Information and Technology, Chair of IT Security, Technical University of Munich, Germany and Department Product Protection and Industrial Security, Fraunhofer AISEC, Germany"],"affiliations":[{"raw_affiliation_string":"TUM School of Computation, Information and Technology, Chair of IT Security, Technical University of Munich, Germany and Department Product Protection and Industrial Security, Fraunhofer AISEC, Germany","institution_ids":["https://openalex.org/I4210136922","https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080309274","display_name":"Michael P. Heinl","orcid":"https://orcid.org/0000-0002-1094-4828"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael P. Heinl","raw_affiliation_strings":["TUM School of Computation, Information and Technology, Chair of IT Security, Technical University of Munich, Germany and Department Product Protection and Industrial Security, Fraunhofer AISEC, Germany"],"affiliations":[{"raw_affiliation_string":"TUM School of Computation, Information and Technology, Chair of IT Security, Technical University of Munich, Germany and Department Product Protection and Industrial Security, Fraunhofer AISEC, Germany","institution_ids":["https://openalex.org/I4210136922","https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058138020","display_name":"Philipp Zieris","orcid":"https://orcid.org/0000-0001-9658-1572"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Philipp Zieris","raw_affiliation_strings":["TUM School of Computation, Information and Technology, Chair of IT Security, Technical University of Munich, Germany and Department Product Protection and Industrial Security, Fraunhofer AISEC, Germany"],"affiliations":[{"raw_affiliation_string":"TUM School of Computation, Information and Technology, Chair of IT Security, Technical University of Munich, Germany and Department Product Protection and Industrial Security, Fraunhofer AISEC, Germany","institution_ids":["https://openalex.org/I4210136922","https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013202845","display_name":"Mykolai Protsenko","orcid":"https://orcid.org/0000-0002-2706-3920"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mykolai Protsenko","raw_affiliation_strings":["Department Secure Operating Systems, Fraunhofer AISEC, Germany"],"affiliations":[{"raw_affiliation_string":"Department Secure Operating Systems, Fraunhofer AISEC, Germany","institution_ids":["https://openalex.org/I4210136922"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105094334","display_name":"Thorsten Larsen-Vefring","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139566","display_name":"TRUMPF (Germany)","ror":"https://ror.org/03459qp74","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210139566"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thorsten Larsen-Vefring","raw_affiliation_strings":["TRUMPF Werkzeugmaschinen SE + Co. KG, Germany"],"affiliations":[{"raw_affiliation_string":"TRUMPF Werkzeugmaschinen SE + Co. KG, Germany","institution_ids":["https://openalex.org/I4210139566"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Marcel Ely Gomes","orcid":"https://orcid.org/0009-0004-0933-1911"},"institutions":[{"id":"https://openalex.org/I4210139566","display_name":"TRUMPF (Germany)","ror":"https://ror.org/03459qp74","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210139566"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Marcel Ely Gomes","raw_affiliation_strings":["TRUMPF Werkzeugmaschinen SE + Co. KG, Germany"],"affiliations":[{"raw_affiliation_string":"TRUMPF Werkzeugmaschinen SE + Co. KG, Germany","institution_ids":["https://openalex.org/I4210139566"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080000653","display_name":"Aliza Maftun","orcid":null},"institutions":[{"id":"https://openalex.org/I1325886976","display_name":"Siemens (Germany)","ror":"https://ror.org/059mq0909","country_code":"DE","type":"company","lineage":["https://openalex.org/I1325886976"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Aliza Maftun","raw_affiliation_strings":["Siemens AG, Germany"],"affiliations":[{"raw_affiliation_string":"Siemens AG, Germany","institution_ids":["https://openalex.org/I1325886976"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087941857","display_name":"Thomas Zeschg","orcid":null},"institutions":[{"id":"https://openalex.org/I1325886976","display_name":"Siemens (Germany)","ror":"https://ror.org/059mq0909","country_code":"DE","type":"company","lineage":["https://openalex.org/I1325886976"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Zeschg","raw_affiliation_strings":["Siemens AG, Germany"],"affiliations":[{"raw_affiliation_string":"Siemens AG, Germany","institution_ids":["https://openalex.org/I1325886976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5039722524"],"corresponding_institution_ids":["https://openalex.org/I4210136922","https://openalex.org/I62916508"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16713884,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/gateway","display_name":"Gateway (web page)","score":0.8652215003967285},{"id":"https://openalex.org/keywords/reset","display_name":"Reset (finance)","score":0.8580904603004456},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6012200117111206},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5808329582214355},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3572087585926056},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.33917492628097534},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3203877806663513},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2735888361930847},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.14875176548957825}],"concepts":[{"id":"https://openalex.org/C2777710495","wikidata":"https://www.wikidata.org/wiki/Q5527195","display_name":"Gateway (web page)","level":2,"score":0.8652215003967285},{"id":"https://openalex.org/C2779795794","wikidata":"https://www.wikidata.org/wiki/Q7315343","display_name":"Reset (finance)","level":2,"score":0.8580904603004456},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6012200117111206},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5808329582214355},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3572087585926056},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33917492628097534},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3203877806663513},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2735888361930847},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.14875176548957825},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3664476.3670940","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670940","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:null:publica/475626","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/475626","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference paper"}],"best_oa_location":{"id":"doi:10.1145/3664476.3670940","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670940","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.5,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W220935706","https://openalex.org/W1744779065","https://openalex.org/W2017167863","https://openalex.org/W2029693536","https://openalex.org/W2141610814","https://openalex.org/W2270626211","https://openalex.org/W2599676162","https://openalex.org/W2772805705","https://openalex.org/W2802530176","https://openalex.org/W2915352631","https://openalex.org/W2952419629","https://openalex.org/W2983338111","https://openalex.org/W3049625451","https://openalex.org/W3097016978","https://openalex.org/W3110452472","https://openalex.org/W3202603325","https://openalex.org/W3208401999","https://openalex.org/W3214084080","https://openalex.org/W4226075590","https://openalex.org/W4293234303","https://openalex.org/W4312438667","https://openalex.org/W4319083693","https://openalex.org/W4365934498","https://openalex.org/W4386588931","https://openalex.org/W4388958855","https://openalex.org/W4394644850"],"related_works":["https://openalex.org/W350273603","https://openalex.org/W2393495588","https://openalex.org/W96259911","https://openalex.org/W2168225754","https://openalex.org/W4385608460","https://openalex.org/W2370772865","https://openalex.org/W1528611913","https://openalex.org/W2000034628","https://openalex.org/W2387487224","https://openalex.org/W4366146733"],"abstract_inverted_index":{"The":[0,141],"increasing":[1],"digitization":[2],"of":[3,16,42,60,130,168],"modern":[4],"flexible":[5],"manufacturing":[6,43],"systems":[7],"has":[8,30],"opened":[9],"up":[10],"new":[11],"possibilities":[12],"for":[13,21,83,104],"higher":[14],"levels":[15],"automation,":[17],"paving":[18],"the":[19,36,57,81,127,165],"way":[20],"innovative":[22],"concepts":[23],"such":[24],"as":[25,80],"Equipment-as-a-Service.":[26],"Concurrently,":[27],"remote":[28,58,136,166],"access":[29],"gained":[31],"traction,":[32],"notably":[33],"accelerated":[34],"by":[35],"COVID-19":[37],"pandemic.":[38],"While":[39],"some":[40],"areas":[41],"have":[44],"embraced":[45],"these":[46],"advancements,":[47],"safety":[48,62,88],"applications":[49],"remain":[50],"localized.":[51],"This":[52],"work":[53],"aims":[54],"to":[55,125,148],"enable":[56,135],"reset":[59,137],"local":[61],"events.":[63],"To":[64,109],"identify":[65],"necessary":[66],"requirements,":[67],"we":[68,113,144,156],"conducted":[69],"expert-workshops":[70],"and":[71,75,87,102,106,122,133,152,160],"analyzed":[72],"relevant":[73],"standards":[74],"regulations.":[76],"These":[77],"requirements":[78,151],"serve":[79],"foundation":[82],"a":[84,92,115,119,131,158],"comprehensive":[85],"security":[86],"concept,":[89],"built":[90],"around":[91],"secure":[93,97,105,159],"gateway.":[94],"It":[95],"uses":[96],"elements,":[98],"crypto":[99],"agility,":[100],"PQC,":[101],"certificates":[103],"authentic":[107],"communication.":[108],"show":[110],"its":[111],"applicability,":[112],"implemented":[114],"prototype,":[116],"which":[117],"utilizes":[118],"gateway,":[120],"cameras,":[121],"light":[123],"barriers":[124],"monitor":[126],"danger":[128],"zone":[129],"robot":[132],"thus":[134],"via":[138],"public":[139],"Internet.":[140],"real-world":[142],"limitations":[143],"faced,":[145],"were":[146],"used":[147],"refine":[149],"our":[150],"concept":[153],"iteratively.":[154],"Ultimately,":[155],"present":[157],"safe":[161],"solution":[162],"that":[163],"enables":[164],"acknowledgment":[167],"safety-critical":[169],"applications.":[170]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
