{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:05:17Z","timestamp":1730214317851,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/desec.2018.8625140","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T22:35:19Z","timestamp":1551393319000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things"],"prefix":"10.1109","author":[{"given":"Matthew","family":"Hagan","sequence":"first","affiliation":[]},{"given":"Fahad","family":"Siddiqui","sequence":"additional","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]},{"given":"BooJoong","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Kieran","family":"McLaughlin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"TPLINK TLWR740N ROUTER REMOTE CODE EXECUTION","year":"2017","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/ICSME.2017.15","article-title":"Embroidery: Patching vulnerable binary code of fragmentized android devices","author":"zhang","year":"2017","journal-title":"Software Maintenance and Evolution (ICSME) 2017 IEEE International Conference on"},{"journal-title":"The Trustworthy Computing Security Development Lifecycle","year":"2005","author":"lipner","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321692"},{"journal-title":"Programming Multicore and Many-core Computing Systems","year":"2003","author":"howard","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2714641"},{"key":"ref16","article-title":"Attack trees","author":"schneier","year":"1999","journal-title":"Dr Dobb's Journal"},{"journal-title":"Secrets & Lies Digital Security in a Networked World","year":"2000","author":"schneier","key":"ref17"},{"journal-title":"A Guide to Understanding Security Modeling in Trusted Systems","year":"1993","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/129902.129907"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.sysarc.2017.09.001","article-title":"Towards decentralized system-level security for MPSoC-based embedded applications","volume":"80","author":"benjamin","year":"2017","journal-title":"Journal of Systems Architecture"},{"journal-title":"Strategic principles for securing the internet of things","year":"2016","key":"ref4"},{"key":"ref27","first-page":"124","article-title":"Threat modeling using attack trees","volume":"23","author":"saini","year":"2008","journal-title":"J Comput Sci Coll"},{"key":"ref3","first-page":"1093","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"journal-title":"FTC Approves Final Order Settling Charges Against TRENDnet Inc","year":"2014","key":"ref6"},{"journal-title":"Sp 800-82 guide to industrial control systems (ics) security Supervisory control and data acquisition (scada) systems distributed control systems (dcs) and other control system configurations such as programmable logic controllers (plc)","year":"2011","author":"stouffer","key":"ref29"},{"journal-title":"Secure by Design Improving the cyber security of consumer Internet of Things Report","year":"0","key":"ref5"},{"journal-title":"Arm platform security architecture overview","year":"2017","key":"ref8"},{"key":"ref7","article-title":"Application Threat Modeling","author":"lowry","year":"2015","journal-title":"OWASP"},{"journal-title":"Future-proofing the Connected World","year":"2016","key":"ref2"},{"key":"ref9","article-title":"The impact of third-party code on android app security","author":"derr","year":"2018","journal-title":"Enigma 2018 (Enigma 2018)"},{"journal-title":"The route to a trillion devices The outlook for IoT investment to 2035","year":"2017","key":"ref1"},{"journal-title":"Security enhanced linux","year":"2008","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0010"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361067"},{"key":"ref24","first-page":"88","article-title":"A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux","volume":"4","author":"peter amthor","year":"2015","journal-title":"2015 12th International Joint Conference on e-Business and Telecommunications (ICETE)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/NOTERE.2016.7745830"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.05.008"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"}],"event":{"name":"2018 IEEE Conference on Dependable and Secure Computing (DSC)","start":{"date-parts":[[2018,12,10]]},"location":"Kaohsiung, Taiwan","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE Conference on Dependable and Secure Computing (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8614461\/8625077\/08625140.pdf?arnumber=8625140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T01:37:39Z","timestamp":1598233059000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8625140\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/desec.2018.8625140","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}