{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:10:51Z","timestamp":1772039451091,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/hst.2018.8383884","type":"proceedings-article","created":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T19:36:11Z","timestamp":1529004971000},"page":"1-8","source":"Crossref","is-referenced-by-count":44,"title":["Syndrome: Spectral analysis for anomaly detection on medical IoT and embedded devices"],"prefix":"10.1109","author":[{"given":"Nader","family":"Sehatbakhsh","sequence":"first","affiliation":[]},{"given":"Monjur","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Alireza","family":"Nazari","sequence":"additional","affiliation":[]},{"given":"Alenka","family":"Zajic","sequence":"additional","affiliation":[]},{"given":"Milos","family":"Prvulovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10470-011-9777-4"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.39"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_26"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/9780470508510"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(86)90125-2"},{"key":"ref12","first-page":"9","article-title":"Wattsupdoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices","author":"clark","year":"2013","journal-title":"Proceedings of the 2013 USENIX Conference on Safety Security Privacy and Interoperability of Health Information Technologies HealthTech'13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783762"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931065"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080223"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"ref17","article-title":"Security on arm trustzone","year":"2017","journal-title":"Retrieved on Oct 11 from"},{"key":"ref18","article-title":"Low Level Virtual Machine (LLVM)","author":"schmidt","year":"2014","journal-title":"Retrieved on April 1 from"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1951.10500769"},{"key":"ref28","article-title":"Lightdm","year":"2017","journal-title":"Retrieved on Oct 11 from"},{"key":"ref4","article-title":"Medical devices hit by ransomware for the first time in us hospitals","author":"fox-brewster","year":"2017","journal-title":"Retrieved on Oct 5 from"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0107216"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"ref5","article-title":"Health care cyberthreat report: Widespread compromises detected, compliance nightmare on horizon","author":"institute","year":"2014","journal-title":"Retrieved on Sept 11 from"},{"key":"ref8","article-title":"Open syringe pump","year":"2014","journal-title":"Retrieved on July 2 from"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2015.7435694"},{"key":"ref2","first-page":"150","article-title":"Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system","author":"li","year":"2011","journal-title":"2011 IEEE 13th International Conference on E-Health Networking Applications and Services"},{"key":"ref9","article-title":"Arduino uno v3","year":"2017","journal-title":"Retrieved on Oct 10 from"},{"key":"ref1","article-title":"Fda's role in ensuring american patients have access to safe and effective medical device technology","year":"2015","journal-title":"Retrieved on Oct 1 from"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523661"},{"key":"ref22","author":"fpga","year":"2017","journal-title":"Nios II Processor"},{"key":"ref21","author":"one","year":"2017","journal-title":"Smashing the Stack for Fun and Profit"},{"key":"ref24","article-title":"Datasheet: Rf near field probe set dc to 9GHz","year":"2016","journal-title":"Retrieved April 6 2016 from"},{"key":"ref23","year":"0","journal-title":"A13-olinuxino-micro user manual"},{"key":"ref26","first-page":"109","author":"tang","year":"2014","journal-title":"Unsupervised Anomaly-Based Malware Detection Using Hardware Features"},{"key":"ref25","article-title":"Usrp-b200mini","author":"research","year":"2017","journal-title":"Retrieved on Oct 11 from"}],"event":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"Washington, DC","start":{"date-parts":[[2018,4,30]]},"end":{"date-parts":[[2018,5,4]]}},"container-title":["2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8369415\/8383882\/08383884.pdf?arnumber=8383884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T21:31:29Z","timestamp":1530567089000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8383884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/hst.2018.8383884","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}