{"id":"https://openalex.org/W4200317357","doi":"https://doi.org/10.23919/cnsm52442.2021.9615597","title":"Inferring Software Composition and Credentials of Embedded Devices from Partial Knowledge","display_name":"Inferring Software Composition and Credentials of Embedded Devices from Partial Knowledge","publication_year":2021,"publication_date":"2021-10-25","ids":{"openalex":"https://openalex.org/W4200317357","doi":"https://doi.org/10.23919/cnsm52442.2021.9615597"},"language":"en","primary_location":{"id":"doi:10.23919/cnsm52442.2021.9615597","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cnsm52442.2021.9615597","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 17th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034167420","display_name":"Pierre-Marie Junges","orcid":null},"institutions":[{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]},{"id":"https://openalex.org/I90183372","display_name":"Universit\u00e9 de Lorraine","ror":"https://ror.org/04vfs2w97","country_code":"FR","type":"education","lineage":["https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Pierre-Marie Junges","raw_affiliation_strings":["University of Lorraine, Inria, LORIA, France"],"affiliations":[{"raw_affiliation_string":"University of Lorraine, Inria, LORIA, France","institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I90183372"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035034365","display_name":"J\u00e9r\u00f4me Fran\u00e7ois","orcid":"https://orcid.org/0000-0002-7457-458X"},"institutions":[{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]},{"id":"https://openalex.org/I90183372","display_name":"Universit\u00e9 de Lorraine","ror":"https://ror.org/04vfs2w97","country_code":"FR","type":"education","lineage":["https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jerome Francois","raw_affiliation_strings":["University of Lorraine, Inria, LORIA, France"],"affiliations":[{"raw_affiliation_string":"University of Lorraine, Inria, LORIA, France","institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I90183372"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080464551","display_name":"Olivier Festor","orcid":"https://orcid.org/0000-0002-3181-7967"},"institutions":[{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]},{"id":"https://openalex.org/I90183372","display_name":"Universit\u00e9 de Lorraine","ror":"https://ror.org/04vfs2w97","country_code":"FR","type":"education","lineage":["https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Olivier Festor","raw_affiliation_strings":["University of Lorraine, Inria, LORIA, France"],"affiliations":[{"raw_affiliation_string":"University of Lorraine, Inria, LORIA, France","institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I90183372"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034167420"],"corresponding_institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I90183372"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17440841,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"437","last_page":"445"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/telnet","display_name":"Telnet","score":0.874386191368103},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8043449521064758},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.7786272764205933},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.7427173852920532},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.719650387763977},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5845697522163391},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4615590274333954},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4490247964859009},{"id":"https://openalex.org/keywords/dictionary-attack","display_name":"Dictionary attack","score":0.43944475054740906},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42446139454841614},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.30974751710891724},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.26617616415023804},{"id":"https://openalex.org/keywords/file-transfer-protocol","display_name":"File Transfer Protocol","score":0.1281655728816986}],"concepts":[{"id":"https://openalex.org/C2776538122","wikidata":"https://www.wikidata.org/wiki/Q160470","display_name":"Telnet","level":4,"score":0.874386191368103},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8043449521064758},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.7786272764205933},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.7427173852920532},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.719650387763977},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5845697522163391},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4615590274333954},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4490247964859009},{"id":"https://openalex.org/C113328881","wikidata":"https://www.wikidata.org/wiki/Q599809","display_name":"Dictionary attack","level":3,"score":0.43944475054740906},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42446139454841614},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.30974751710891724},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.26617616415023804},{"id":"https://openalex.org/C169485995","wikidata":"https://www.wikidata.org/wiki/Q42283","display_name":"File Transfer Protocol","level":3,"score":0.1281655728816986}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cnsm52442.2021.9615597","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cnsm52442.2021.9615597","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 17th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2001637908","https://openalex.org/W2091939272","https://openalex.org/W2114398364","https://openalex.org/W2119812052","https://openalex.org/W2165572597","https://openalex.org/W2180970301","https://openalex.org/W2469987047","https://openalex.org/W2524477303","https://openalex.org/W2564566221","https://openalex.org/W2574448563","https://openalex.org/W2576376563","https://openalex.org/W2586432806","https://openalex.org/W2733765803","https://openalex.org/W2738334271","https://openalex.org/W2748868501","https://openalex.org/W2801218465","https://openalex.org/W2809494870","https://openalex.org/W2888096149","https://openalex.org/W2891921089","https://openalex.org/W2895909303","https://openalex.org/W2901909474","https://openalex.org/W2913860854","https://openalex.org/W2921669466","https://openalex.org/W2946905075","https://openalex.org/W2950767885","https://openalex.org/W2963532960","https://openalex.org/W2965118803","https://openalex.org/W2969468102","https://openalex.org/W2971604521","https://openalex.org/W3182377220","https://openalex.org/W4287689466","https://openalex.org/W6677217071","https://openalex.org/W6678042037","https://openalex.org/W6732005117","https://openalex.org/W6743493502","https://openalex.org/W6762982010","https://openalex.org/W6767208688","https://openalex.org/W6798633229"],"related_works":["https://openalex.org/W2086553822","https://openalex.org/W42204834","https://openalex.org/W1992120644","https://openalex.org/W4200510632","https://openalex.org/W2293362975","https://openalex.org/W2045119723","https://openalex.org/W4319158737","https://openalex.org/W2986253541","https://openalex.org/W2906808255","https://openalex.org/W2301158923"],"abstract_inverted_index":{"Internet-of-Things":[0],"(IoT)":[1],"devices":[2,7,42],"or":[3,15,162,183],"more":[4,190,214],"generally":[5],"embedded":[6,157],"are":[8],"nowadays":[9],"commonly":[10],"deployed":[11],"in":[12,189,213],"public,":[13],"personal":[14],"work":[16],"spaces":[17],"despite":[18],"suffering":[19],"from":[20,117,136],"security":[21],"issues":[22],"often":[23],"related":[24],"to":[25,80,102],"their":[26],"bad":[27],"design":[28],"and/or":[29],"configuration.":[30],"For":[31],"instance,":[32],"IoT":[33,108],"botnets":[34],"such":[35,120],"as":[36,121,145],"Mirai":[37],"successfully":[38],"compromised":[39],"thousands":[40],"of":[41,50,93,140,155,193,207,217],"using":[43],"a":[44,48,57,86,90,100,126,133,137,153,170,176],"bruteforce":[45],"method":[46,101],"on":[47,77,85,131,198,223],"set":[49],"known":[51],"credentials.":[52],"Although":[53],"brute-force":[54],"attacks":[55],"against":[56],"particular":[58],"service":[59],"(e.g.":[60],"SSH,":[61],"telnet)":[62],"generate":[63],"many":[64],"packets":[65],"which":[66],"can":[67,74,166,186],"be":[68,167,187],"easily":[69,75],"detected":[70],"and":[71],"mitigated,":[72],"attackers":[73],"rely":[76],"TCP":[78,127],"scans":[79],"assess":[81],"the":[82,159,205,218],"services":[83],"present":[84,99],"device":[87,109],"while":[88],"maintaining":[89],"high":[91],"level":[92],"stealthiness.":[94],"In":[95],"this":[96],"paper,":[97],"we":[98],"reconstruct":[103],"precise":[104],"information":[105],"about":[106],"an":[107],"configuration":[110],"(brand":[111],"name,":[112],"usernames,":[113],"passwords,":[114],"software":[115,164],"components)":[116],"partial":[118],"knowledge":[119,134],"open":[122],"ports":[123],"revealed":[124],"by":[125],"scan.":[128],"It":[129],"relies":[130],"constituting":[132],"base":[135],"large":[138],"dataset":[139,154],"publicly":[141],"accessible":[142],"firmware":[143],"serving":[144],"training":[146],"multiple":[147],"Random":[148],"Forest":[149],"(RF)":[150],"classifiers.":[151],"Using":[152],"6935":[156],"devices,":[158],"HTTP,":[160,181],"SSH":[161,182],"DNS":[163,184],"names":[165],"predicted":[168],"with":[169,175],"precision":[171],"higher":[172],"than":[173,191,215],"80%":[174],"limited":[177],"knowledge.":[178],"The":[179],"correct":[180],"versions":[185],"inferred":[188],"95%":[192],"cases":[194,219],"after":[195,220],"1.4":[196],"trials":[197,222],"average.":[199,224],"Similarly,":[200],"our":[201],"technique":[202],"also":[203],"predicts":[204],"password":[206],"at":[208],"least":[209],"one":[210],"valid":[211],"user":[212],"97%":[216],"1.15":[221]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
