{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:31:42Z","timestamp":1761611502861},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/gcwkshps45667.2019.9024539","type":"proceedings-article","created":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T17:06:31Z","timestamp":1583514391000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["MAD-IoT: Memory Anomaly Detection for the Internet of Things"],"prefix":"10.1109","author":[{"given":"Jonathan","family":"Myers","sequence":"first","affiliation":[]},{"given":"Leonardo","family":"Babun","sequence":"additional","affiliation":[]},{"given":"Edward","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Helble","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Allen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"13","article-title":"Copilot - a coprocessor-based kernel runtime integrity monitor","author":"petroni","year":"2004","journal-title":"Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 ser SSYM&#x2019;04"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.50"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866313"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599862"},{"article-title":"Trusted platform on demand (tpod)","year":"2004","author":"maruyama","key":"ref14"},{"key":"ref15","first-page":"16:1","article-title":"Oslo: Improving the security of trusted computing","author":"kauer","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium"},{"year":"2019","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996877"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095812"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8423022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314362"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599735"},{"key":"ref2","first-page":"147","article-title":"Soteria: Automated iot safety and security analysis","author":"celik","year":"2018","journal-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)"},{"key":"ref1","first-page":"1687","article-title":"Sensitive information tracking in commodity iot","author":"celik","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"article-title":"An architecture for specification-based detection of semantic integrity violations in kernel dynamic data","year":"2006","author":"petroni","key":"ref9"}],"event":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2019,12,9]]},"location":"Waikoloa, HI, USA","end":{"date-parts":[[2019,12,13]]}},"container-title":["2019 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9006988\/9024317\/09024539.pdf?arnumber=9024539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:18:35Z","timestamp":1657855115000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9024539\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/gcwkshps45667.2019.9024539","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}