{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:11:24Z","timestamp":1750824684960,"version":"3.41.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/asap.2017.7995260","type":"proceedings-article","created":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T20:38:16Z","timestamp":1501533496000},"page":"61-66","source":"Crossref","is-referenced-by-count":5,"title":["Hardware support for embedded operating system security"],"prefix":"10.1109","author":[{"given":"Arman","family":"Pouraghily","sequence":"first","affiliation":[]},{"given":"Tilman","family":"Wolf","sequence":"additional","affiliation":[]},{"given":"Russell","family":"Tessier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.266"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278605"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2435750"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2015.7245721"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.50"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2000.896367"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488832"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2014.6881538"},{"key":"ref18","article-title":"FormatGuard: Automatic protection from printf format string vulnerabilities","author":"cowan","year":"2001","journal-title":"USENIX Security Symposium"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02333-0","author":"jaeger","year":"2008","journal-title":"Operating System Secrity"},{"key":"ref3","article-title":"A new era of internet attacks powered by everyday devices","author":"sanger","year":"2016","journal-title":"The New York Times"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.31"},{"key":"ref5","first-page":"85","article-title":"Secure program execution via dynamic information flow tracking","author":"suh","year":"2004","journal-title":"ASPLOS-XI Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.19"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2422674"},{"journal-title":"Internet of Things Privacy & Security in a Connected World Federal Trade Commission","year":"2015","key":"ref2"},{"key":"ref1","first-page":"389","author":"medaglia","year":"2010","journal-title":"An Overview of Privacy and Security Issues in the Internet of Things"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924295"}],"event":{"name":"2017 IEEE 28th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","start":{"date-parts":[[2017,7,10]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2017,7,12]]}},"container-title":["2017 IEEE 28th International Conference on Application-specific Systems, Architectures and Processors (ASAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7990450\/7995241\/07995260.pdf?arnumber=7995260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T19:15:30Z","timestamp":1750792530000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7995260\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/asap.2017.7995260","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}