{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T13:07:18Z","timestamp":1748956038141,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/socc.2018.8618544","type":"proceedings-article","created":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T07:02:38Z","timestamp":1548140558000},"page":"84-89","source":"Crossref","is-referenced-by-count":9,"title":["Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures"],"prefix":"10.1109","author":[{"given":"Matthew","family":"Hagan","sequence":"first","affiliation":[]},{"given":"Fahad","family":"Siddiqui","sequence":"additional","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Technical report HM Government","article-title":"National Cyber Security Strategy 2016 to 2021","year":"2016","key":"ref10"},{"journal-title":"A Guide to Understanding Security Modeling in Trusted Systems","year":"1993","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/129902.129907"},{"journal-title":"National Security Agency Central Security Service","article-title":"Security enhanced linux","year":"2008","key":"ref13"},{"key":"ref14","first-page":"29","article-title":"Integrating flexible support for security policies into the linux operating system","author":"loscocco","year":"2001","journal-title":"Proceedings of the FREENIX Track 2001 USENIX Annual Technical Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2714641"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NOTERE.2016.7745830"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2018.8369033"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2017.09.001"},{"key":"ref28","first-page":"1","article-title":"Design and Implementation of the SELinux Policy Management Server","author":"macmillan","year":"2006","journal-title":"Security Enhanced Linux Symposium"},{"journal-title":"Remote exploitation of an unaltered passenger vehicle","year":"2015","author":"valasek","key":"ref4"},{"key":"ref27","article-title":"SELinux User's and Administrator's Guide","author":"jahoda","year":"2018","journal-title":"RedHat Tech Rep"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"ref6","article-title":"Application Threat Modeling","author":"lowry","year":"2015","journal-title":"OWASP Tech Rep"},{"key":"ref5","first-page":"1","article-title":"Identifying Supervisory Control and Data Acquisition (SCADA) Devices and their Vulnerabilities on the Internet of Things (IoT): A Text Mining Approach","author":"samtani","year":"2018","journal-title":"IEEE Intelligent Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2781198"},{"journal-title":"A Technical Report","article-title":"ARM Platform Security Architecture Overview","year":"2017","key":"ref7"},{"key":"ref2","first-page":"1093","article-title":"Understanding the Mirai Botnet","author":"antonakakis","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224330"},{"key":"ref1","article-title":"White Paper: The route to a trillion devices: The outlook for IoT investment to 2035","author":"spark","year":"2017","journal-title":"A Technical Report"},{"key":"ref20","article-title":"Evidence identification in iot networks based on threat assessment","author":"akatyev","year":"2017","journal-title":"Future Generation Computer Systems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2015.2390920"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0010"},{"key":"ref24","first-page":"6","article-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces","author":"checkoway","year":"2011","journal-title":"Proceedings of the 20th USENIX Conference on Security Ser SEC'11"},{"journal-title":"International Organization for Standardization","article-title":"Road vehicles - Controller area network (CAN) - Part 1: Data link layer and physical signalling","year":"2015","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref25","first-page":"388","article-title":"Protection and the control of information sharing in multics","volume":"17","author":"saltzer","year":"1973","journal-title":"ACM SIGOPS Operating Systems Review"}],"event":{"name":"2018 31st IEEE International System-on-Chip Conference (SOCC)","start":{"date-parts":[[2018,9,4]]},"location":"Arlington, VA","end":{"date-parts":[[2018,9,7]]}},"container-title":["2018 31st IEEE International System-on-Chip Conference (SOCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8600278\/8618478\/08618544.pdf?arnumber=8618544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:10:31Z","timestamp":1643242231000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8618544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/socc.2018.8618544","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}