{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:03:50Z","timestamp":1725624230264},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/etfa.2008.4638590","type":"proceedings-article","created":{"date-parts":[[2008,10,7]],"date-time":"2008-10-07T18:08:47Z","timestamp":1223402927000},"page":"1473-1480","source":"Crossref","is-referenced-by-count":3,"title":["Secure and customizable software applications in embedded networks"],"prefix":"10.1109","author":[{"given":"Fritz","family":"Praus","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Flanitzer","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"Kastner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.13"},{"key":"17","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/3-540-68671-1_5","article-title":"safe, untrusted agents using proof-carrying code","author":"necula","year":"1998","journal-title":"Mobile Agents and Security"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015049"},{"key":"15","article-title":"theoretical basis for intrusion detection","author":"li","year":"2005","journal-title":"Proceedings of 6th IEEE Information Assurance Workshop (IAW)"},{"year":"0","key":"16"},{"journal-title":"Konnex Association","year":"2004","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/161494.161501"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2007.358010"},{"key":"12","article-title":"secure execution via program shepherding","author":"kiriansky","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2006.887799"},{"journal-title":"Distributed Systems Principles and Paradigms","year":"2002","author":"tanenbaum","key":"20"},{"journal-title":"US-CERT Vulnerability Notes Database","year":"0","key":"2"},{"year":"0","key":"1"},{"year":"0","key":"10"},{"key":"7","first-page":"63","article-title":"stack-guard: automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"1998","journal-title":"Proc 7th USENIX Security Conference"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.111"},{"key":"5","first-page":"400","article-title":"oblivious hashing: a stealthy software integrity verification primitive","author":"chen","year":"2003","journal-title":"IH'02 Revised Papers From the 5th International Workshop on Information Hiding"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2006.1704168"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"}],"event":{"name":"Factory Automation (ETFA 2008)","start":{"date-parts":[[2008,9,15]]},"location":"Hamburg, Germany","end":{"date-parts":[[2008,9,18]]}},"container-title":["2008 IEEE International Conference on Emerging Technologies and Factory Automation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4631965\/4638343\/04638590.pdf?arnumber=4638590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T12:21:57Z","timestamp":1497788517000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4638590\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/etfa.2008.4638590","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}