{"id":"https://openalex.org/W2781741036","doi":"https://doi.org/10.1109/csnet.2017.8241991","title":"A fake timing attack against behavioural tests used in embedded IoT M2M communications","display_name":"A fake timing attack against behavioural tests used in embedded IoT M2M communications","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2781741036","doi":"https://doi.org/10.1109/csnet.2017.8241991","mag":"2781741036"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet.2017.8241991","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051801356","display_name":"Valerio Selis","orcid":"https://orcid.org/0000-0002-1856-4707"},"institutions":[{"id":"https://openalex.org/I146655781","display_name":"University of Liverpool","ror":"https://ror.org/04xs57h96","country_code":"GB","type":"education","lineage":["https://openalex.org/I146655781"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Valerio Selis","raw_affiliation_strings":["Department of Electrical Engineering and Electronics, University of Liverpool, Liverpool, UK"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Electronics, University of Liverpool, Liverpool, UK","institution_ids":["https://openalex.org/I146655781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081759293","display_name":"Alan Marshall","orcid":"https://orcid.org/0000-0002-8058-5242"},"institutions":[{"id":"https://openalex.org/I146655781","display_name":"University of Liverpool","ror":"https://ror.org/04xs57h96","country_code":"GB","type":"education","lineage":["https://openalex.org/I146655781"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Alan Marshall","raw_affiliation_strings":["Department of Electrical Engineering and Electronics, University of Liverpool, Liverpool, UK"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Electronics, University of Liverpool, Liverpool, UK","institution_ids":["https://openalex.org/I146655781"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.562,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":10,"citation_normalized_percentile":{"value":0.769988,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9953,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/machine-to-machine","display_name":"Machine to machine","score":0.67778236}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7736572},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.71854},{"id":"https://openalex.org/C76763059","wikidata":"https://www.wikidata.org/wiki/Q251072","display_name":"Machine to machine","level":3,"score":0.67778236},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5940622},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5904227},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44632268},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.44059643},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4252973},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3827451},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14495215},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet.2017.8241991","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":27,"referenced_works":["https://openalex.org/W1604135736","https://openalex.org/W1989623273","https://openalex.org/W1992181084","https://openalex.org/W2003167758","https://openalex.org/W2015790908","https://openalex.org/W2022745895","https://openalex.org/W2030560149","https://openalex.org/W2073618626","https://openalex.org/W2082778186","https://openalex.org/W2087310019","https://openalex.org/W2089629852","https://openalex.org/W2090534521","https://openalex.org/W2101234009","https://openalex.org/W2104599106","https://openalex.org/W2105103777","https://openalex.org/W2115175195","https://openalex.org/W2117806953","https://openalex.org/W2117882778","https://openalex.org/W2123649966","https://openalex.org/W2123899238","https://openalex.org/W2134295053","https://openalex.org/W2193838104","https://openalex.org/W2293267147","https://openalex.org/W2405780103","https://openalex.org/W2911964244","https://openalex.org/W4290189322","https://openalex.org/W78162143"],"related_works":["https://openalex.org/W4361251261","https://openalex.org/W4311097251","https://openalex.org/W4247463117","https://openalex.org/W4245926026","https://openalex.org/W4200598720","https://openalex.org/W3212933010","https://openalex.org/W2950174689","https://openalex.org/W2921026492","https://openalex.org/W2625093826","https://openalex.org/W2586548817"],"abstract_inverted_index":{"Interconnected":[0],"embedded":[1,56,95,113,125],"machines":[2,23,41,57,114,126],"in":[3,28,55,63],"the":[4,19,46,77,90],"Internet":[5],"of":[6,88,93],"Things":[7],"(IoT)":[8],"play":[9],"a":[10,81,102],"key":[11],"role":[12],"for":[13,105],"collecting":[14],"and":[15,109,118],"managing":[16],"data":[17],"from":[18],"real":[20,94],"environment.":[21],"These":[22],"adopt":[24],"Machine-to-Machine":[25],"(M2M)":[26],"networks":[27],"order":[29,64],"to":[30,48,65,75,127],"exchange":[31],"information.":[32],"Securing":[33],"this":[34,98,107],"information":[35],"is":[36],"therefore":[37],"essential.":[38],"However,":[39,69],"these":[40],"have":[42],"reduced":[43],"capabilities":[44],"giving":[45],"opportunity":[47],"be":[49],"easily":[50],"compromised.":[51],"IoT":[52,124],"trust":[53,66],"agents":[54],"can":[58,71],"use":[59,72],"timing-based":[60],"behavioural":[61],"tests":[62],"each":[67],"other.":[68],"attackers":[70],"powerful":[73],"systems":[74],"subvert":[76],"network":[78],"by":[79],"launching":[80],"fake":[82],"timing":[83,91],"attack.":[84],"This":[85,121],"attack":[86,108],"consists":[87],"mimicking":[89],"behaviours":[92],"machines.":[96],"In":[97],"work,":[99],"we":[100],"present":[101],"detection":[103],"algorithm":[104],"detecting":[106,111],"also":[110],"forged":[112],"based":[115],"on":[116],"virtual":[117],"emulated":[119],"systems.":[120],"will":[122],"allow":[123],"create":[128],"trusted":[129],"M2M":[130],"communications.":[131]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2781741036","counts_by_year":[{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-01-08T04:14:56.654722","created_date":"2018-01-12"}