{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T23:13:04Z","timestamp":1769123584621,"version":"3.49.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/snpd.2016.7515933","type":"proceedings-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T20:38:58Z","timestamp":1469565538000},"page":"413-418","source":"Crossref","is-referenced-by-count":9,"title":["Understanding and detecting performance and security bugs in IOT OSes"],"prefix":"10.1109","author":[{"given":"Hongliang","family":"Liang","sequence":"first","affiliation":[]},{"given":"Qian","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yuying","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Haifeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254075"},{"key":"ref32","first-page":"133","article-title":"Contikisec: A secure network layer for wireless sensor networks under the contiki operating system[M]\/\/Identity and Privacy in the Internet Age","author":"casado","year":"2009"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"ref30","author":"roussel","year":"2015","journal-title":"Protocols[J] arXiv preprint arXiv 1504 03875"},{"key":"ref37","year":"0"},{"key":"ref36","year":"0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.100"},{"key":"ref34","first-page":"282","article-title":"SunCat: Helping developers understand and predict performance problems in smartphone applications[C]\/\/Proceedings of the 2014 International Symposium on Software Testing and Analysis","author":"nistor","year":"2014","journal-title":"ACM"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985457"},{"key":"ref11","year":"0"},{"key":"ref12","year":"0"},{"key":"ref13","first-page":"75","article-title":"LLVM: A compilation framework for lifelong program analysis & transformation[C]\/\/Code Generation and Optimization","author":"lattner","year":"2004","journal-title":"CGO 2004 International Symposium on IEEE"},{"key":"ref14","first-page":"455","article-title":"Contiki-a lightweight and flexible operating system for tiny networked sensors[C]\/\/Local Computer Networks","author":"dunkels","year":"2004","journal-title":"2004 29th Annual IEEE International Conference on IEEE"},{"key":"ref15","first-page":"115","article-title":"Tinyos: An operating system for sensor networks[M]\/\/ Ambient intelligence","author":"levis","year":"2005"},{"key":"ref16","first-page":"79","article-title":"RIOT OS: Towards an OS for the Internet of Things[C]\/\/Computer Communications Workshops (INFOCOM WKSHPS)","author":"baccelli","year":"2013","journal-title":"2013 IEEE Conference on IEEE"},{"key":"ref17","year":"0"},{"key":"ref18","year":"0"},{"key":"ref19","year":"0"},{"key":"ref28","article-title":"Evaluating the Performance of RPL and 6LoWPAN in TinyOS[C]\/\/Workshop on Extending the Internet to Low Power and Lossy Networks (IP+ SN)","author":"ko","year":"2011"},{"key":"ref4","year":"0"},{"key":"ref27","first-page":"19","article-title":"Evaluating and analyzing the performance of RPL in contiki[C]\/\/Proceedings of the first international workshop on Mobile sensing","author":"zhang","year":"2014","journal-title":"Computer Comm"},{"key":"ref3","year":"0"},{"key":"ref6","year":"0"},{"key":"ref29","first-page":"7","article-title":"Comparison of operating systems TinyOS and Contiki[J]","author":"reusing","year":"2012","journal-title":"Sens Nodes-Oper Netw Appl"},{"key":"ref5","year":"0"},{"key":"ref8","year":"0"},{"key":"ref7","year":"0"},{"key":"ref2","year":"0"},{"key":"ref9","year":"0"},{"key":"ref1","author":"tiny","year":"0"},{"key":"ref20","author":"brewer","year":"0","journal-title":"nesC A programming language for deeply networked systems 2004"},{"key":"ref22","year":"0"},{"key":"ref21","year":"0"},{"key":"ref24","year":"0"},{"key":"ref23","year":"0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref25","author":"rothstein","year":"2012","journal-title":"Cppcheck design[J] Secure Programming cource for the Spring"}],"event":{"name":"2016 17th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","location":"Shanghai, China","start":{"date-parts":[[2016,5,30]]},"end":{"date-parts":[[2016,6,1]]}},"container-title":["2016 17th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7510515\/7515861\/07515933.pdf?arnumber=7515933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T19:40:06Z","timestamp":1474659606000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7515933\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/snpd.2016.7515933","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}