{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:13Z","timestamp":1750306153706,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,12,6]],"date-time":"2016-12-06T00:00:00Z","timestamp":1480982400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,12,6]]},"DOI":"10.1145\/2996890.3007877","type":"proceedings-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T14:31:54Z","timestamp":1481639514000},"page":"304-309","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Interface diversification in IoT operating systems"],"prefix":"10.1145","author":[{"given":"Petteri","family":"M\u00e4ki","sequence":"first","affiliation":[{"name":"University of Turku, Finland"}]},{"given":"Sampsa","family":"Rauti","sequence":"additional","affiliation":[{"name":"University of Turku, Finland"}]},{"given":"Shohreh","family":"Hosseinzadeh","sequence":"additional","affiliation":[{"name":"University of Turku, Finland"}]},{"given":"Lauri","family":"Koivunen","sequence":"additional","affiliation":[{"name":"University of Turku, Finland"}]},{"given":"Ville","family":"Lepp\u00e4nen","sequence":"additional","affiliation":[{"name":"University of Turku, Finland"}]}],"member":"320","published-online":{"date-parts":[[2016,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/nuttx.org\/. Accessed","author":"Operating System X Real-Time","year":"2016","unstructured":"Nutt X Real-Time Operating System . http:\/\/nuttx.org\/. Accessed 17 August 2016 . NuttX Real-Time Operating System. http:\/\/nuttx.org\/. Accessed 17 August 2016."},{"key":"e_1_3_2_1_2_1","unstructured":"Raspbian. https:\/\/www.raspbian.org\/.  Raspbian. https:\/\/www.raspbian.org\/."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/thingsee.com\/. Accessed","author":"One ThingSee","year":"2016","unstructured":"ThingSee One . https:\/\/thingsee.com\/. Accessed 17 August 2016 . ThingSee One. https:\/\/thingsee.com\/. Accessed 17 August 2016."},{"key":"e_1_3_2_1_4_1","unstructured":"Internet of things research study: 2015 report. http:\/\/www8.hp.com\/h20195\/V2\/GetPDF.aspx\/4AA5-4759ENW.pdf 2015.  Internet of things research study: 2015 report. http:\/\/www8.hp.com\/h20195\/V2\/GetPDF.aspx\/4AA5-4759ENW.pdf 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ihi0042f\/IHI0042F_aapcs.pdf","author":"M\u00ae Architecture Procedure Call","year":"2015","unstructured":"Procedure Call Standard for the AR M\u00ae Architecture . http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ihi0042f\/IHI0042F_aapcs.pdf , 2015 . Procedure Call Standard for the ARM\u00ae Architecture. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ihi0042f\/IHI0042F_aapcs.pdf, 2015."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2240276.2240279"},{"key":"e_1_3_2_1_7_1","first-page":"105","volume-title":"In Proceedings of the 12th USENIX Security Symposium","author":"Bhatkar E.","year":"2003","unstructured":"E. Bhatkar , D.C. Duvarney , and R. Sekar . Address obfuscation: an efficient approach to combat a broad range of memory error exploits . In In Proceedings of the 12th USENIX Security Symposium , pages 105 -- 120 , 2003 . E. Bhatkar, D.C. Duvarney, and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In In Proceedings of the 12th USENIX Security Symposium, pages 105--120, 2003."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900550"},{"key":"e_1_3_2_1_11_1","volume-title":"Up 30 Percent From","author":"Billion Gartner Says","year":"2015","unstructured":"Gartner. Gartner Says 6.4 Billion Connected things Will Be in Use in 2016 , Up 30 Percent From 2015 . http:\/\/www.vxdev.com\/docs\/vx55man\/vxworks\/guide\/c-vm.html. Accessed : 2016-06-23. Gartner. Gartner Says 6.4 Billion Connected things Will Be in Use in 2016, Up 30 Percent From 2015. http:\/\/www.vxdev.com\/docs\/vx55man\/vxworks\/guide\/c-vm.html. Accessed: 2016-06-23."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/B978-0-12-805395-9.00014-9","volume-title":"Internet of Things Principles and Paradigms","author":"Hosseinzadeh S.","year":"2016","unstructured":"S. Hosseinzadeh , S. Hyrynsalmi , and V. Lepp\u00e4nen . Obfuscation and diversification for securing the Internet of Things (IoT) . In Rajkumar Buyya and Amir Vahid Dastjerdi, editors, Internet of Things Principles and Paradigms , chapter 14, pages 259 -- 274 . Morgan Kaufmann is an imprint of Elsevier , Cambridge, MA 02139, USA, 2016 . S. Hosseinzadeh, S. Hyrynsalmi, and V. Lepp\u00e4nen. Obfuscation and diversification for securing the Internet of Things (IoT). In Rajkumar Buyya and Amir Vahid Dastjerdi, editors, Internet of Things Principles and Paradigms, chapter 14, pages 259--274. Morgan Kaufmann is an imprint of Elsevier, Cambridge, MA 02139, USA, 2016."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2015.7374189"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983468.2983479"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.06.045"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2812428.2812447"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/WorldCIS.2014.7028170"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSSS.2012.21"},{"key":"e_1_3_2_1_21_1","volume-title":"DEP\/ASLR implementation progress in popular third-party windows applications","author":"Pop A. R.","year":"2010","unstructured":"A. R. Pop DEP\/ASLR implementation progress in popular third-party windows applications . 2010 . A. R. Pop et al. DEP\/ASLR implementation progress in popular third-party windows applications. 2010."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27998-5_2"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"}],"event":{"name":"UCC '16: 9th International Conference on Utility and Cloud Computing","acronym":"UCC '16","location":"Shanghai China"},"container-title":["Proceedings of the 9th International Conference on Utility and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996890.3007877","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2996890.3007877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:40Z","timestamp":1750217980000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996890.3007877"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,6]]},"references-count":22,"alternative-id":["10.1145\/2996890.3007877","10.1145\/2996890"],"URL":"https:\/\/doi.org\/10.1145\/2996890.3007877","relation":{},"subject":[],"published":{"date-parts":[[2016,12,6]]},"assertion":[{"value":"2016-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}