{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:53:08Z","timestamp":1772041988353,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T00:00:00Z","timestamp":1492473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004083","name":"Ministry of Science ICT and Future Planning","doi-asserted-by":"publisher","award":["IITP-2016-R2720-16-0007"],"award-info":[{"award-number":["IITP-2016-R2720-16-0007"]}],"id":[{"id":"10.13039\/501100004083","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003052","name":"Ministry of Trade, Industry and Energy","doi-asserted-by":"publisher","award":["No. 10063172"],"award-info":[{"award-number":["No. 10063172"]}],"id":[{"id":"10.13039\/501100003052","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009896","name":"U.S. Navy","doi-asserted-by":"publisher","award":["N00014-14-1-0717"],"award-info":[{"award-number":["N00014-14-1-0717"]}],"id":[{"id":"10.13039\/100009896","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 13-02563, CNS 14-23334, CNS 15-45002"],"award-info":[{"award-number":["CNS 13-02563, CNS 14-23334, CNS 15-45002"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,18]]},"DOI":"10.1145\/3054977.3054999","type":"proceedings-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T12:27:04Z","timestamp":1492432024000},"page":"191-196","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Learning Execution Contexts from System Call Distribution for Anomaly Detection in Smart Embedded System"],"prefix":"10.1145","author":[{"given":"Man-Ki","family":"Yoon","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Sibin","family":"Mohan","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Jaesik","family":"Choi","sequence":"additional","affiliation":[{"name":"Ulsan National Institute of Science and Technology"}]},{"given":"Mihai","family":"Christodorescu","sequence":"additional","affiliation":[{"name":"Qalcomm Research Silicon Valley"}]},{"given":"Lui","family":"Sha","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2017,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Motion. http:\/\/www.lavrsen.dk\/foswiki\/bin\/view\/Motion\/WebHome.  Motion. http:\/\/www.lavrsen.dk\/foswiki\/bin\/view\/Motion\/WebHome."},{"key":"e_1_3_2_1_2_1","unstructured":"Raspberry PI 2 Model B. https:\/\/www.raspberrypi.org\/products\/raspberry-pi-2-model-b\/.  Raspberry PI 2 Model B. https:\/\/www.raspberrypi.org\/products\/raspberry-pi-2-model-b\/."},{"key":"e_1_3_2_1_3_1","volume-title":"the first malware for drones. Security Affairs (Jan","author":"Maldrone A","year":"2015","unstructured":"A hacker developed Maldrone , the first malware for drones. Security Affairs (Jan 2015 ). http:\/\/securityaffairs.co\/wordpress\/32767\/hacking\/maldrone-malware-for-drones.html. A hacker developed Maldrone, the first malware for drones. Security Affairs (Jan 2015). http:\/\/securityaffairs.co\/wordpress\/32767\/hacking\/maldrone-malware-for-drones.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Jeep Hacking 101. (Aug 2015). http:\/\/spectrum.ieee.org\/cars-that-think\/transportation\/systems\/jeep-hacking-101.  Jeep Hacking 101. (Aug 2015). http:\/\/spectrum.ieee.org\/cars-that-think\/transportation\/systems\/jeep-hacking-101."},{"key":"e_1_3_2_1_5_1","unstructured":"Hackers broadcast live footage from hacked webcams on YouTube and trolls are loving it. (Apr 2016). https:\/\/blog.kaspersky.com\/2ch-webcam-hack\/11961\/.  Hackers broadcast live footage from hacked webcams on YouTube and trolls are loving it. (Apr 2016). https:\/\/blog.kaspersky.com\/2ch-webcam-hack\/11961\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932213"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00060-2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"e_1_3_2_1_12_1","volume-title":"On the generalized distance in statistics. the National Institute of Sciences 2","author":"Mahalanobis Prasanta Chandra","year":"1936","unstructured":"Prasanta Chandra Mahalanobis . 1936. On the generalized distance in statistics. the National Institute of Sciences 2 ( 1936 ), 49--55. Prasanta Chandra Mahalanobis. 1936. On the generalized distance in statistics. the National Institute of Sciences 2 (1936), 49--55."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366197"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2461446.2461456"},{"key":"e_1_3_2_1_15_1","volume-title":"Outside the Closed World: On Using Machine Learning For Network Intrusion Detection. In the IEEE Symposium on Security and Privacy.","author":"Sommer Robin","year":"2010","unstructured":"Robin Sommer and Vern Paxson . 2010 . Outside the Closed World: On Using Machine Learning For Network Intrusion Detection. In the IEEE Symposium on Security and Privacy. Robin Sommer and Vern Paxson. 2010. Outside the Closed World: On Using Machine Learning For Network Intrusion Detection. In the IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.196"},{"key":"e_1_3_2_1_18_1","volume-title":"The Drag-onBeam Framework: Hardware-Protected Security Modules for In-Place Intrusion Detection. In the ACM International Systems and Storage Conference.","author":"Yoon Man-Ki","year":"2016","unstructured":"Man-Ki Yoon , Mihai Christodorescu , Lui Sha , and Sibin Mohan . 2016 . The Drag-onBeam Framework: Hardware-Protected Security Modules for In-Place Intrusion Detection. In the ACM International Systems and Storage Conference. Man-Ki Yoon, Mihai Christodorescu, Lui Sha, and Sibin Mohan. 2016. The Drag-onBeam Framework: Hardware-Protected Security Modules for In-Place Intrusion Detection. In the ACM International Systems and Storage Conference."},{"key":"e_1_3_2_1_19_1","volume-title":"SecureCore: A Multicore-based Intrusion Detection Architecture for Real-Time Embedded Systems. In the IEEE Real-Time Embedded Technology and Applications Symposium.","author":"Yoon Man-Ki","year":"2013","unstructured":"Man-Ki Yoon , Sibin Mohan , Jaesik Choi , Jung-Eun Kim , and Lui Sha . 2013 . SecureCore: A Multicore-based Intrusion Detection Architecture for Real-Time Embedded Systems. In the IEEE Real-Time Embedded Technology and Applications Symposium. Man-Ki Yoon, Sibin Mohan, Jaesik Choi, Jung-Eun Kim, and Lui Sha. 2013. SecureCore: A Multicore-based Intrusion Detection Architecture for Real-Time Embedded Systems. In the IEEE Real-Time Embedded Technology and Applications Symposium."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744869"},{"key":"e_1_3_2_1_21_1","volume-title":"SiPTA: Signal Processing for Trace-based Anomaly Detection. In the International Conference on Embedded Software.","author":"Zeinali Zadeh Mohammad Mehdi","year":"2014","unstructured":"Mohammad Mehdi Zeinali Zadeh , Mahmoud Salem , Neeraj Kumar , Greta Cutulenco , and Sebastian Fischmeister . 2014 . SiPTA: Signal Processing for Trace-based Anomaly Detection. In the International Conference on Embedded Software. Mohammad Mehdi Zeinali Zadeh, Mahmoud Salem, Neeraj Kumar, Greta Cutulenco, and Sebastian Fischmeister. 2014. SiPTA: Signal Processing for Trace-based Anomaly Detection. In the International Conference on Embedded Software."}],"event":{"name":"IoTDI '17: International Conference on Internet-of-Things Design and Implementation","location":"Pittsburgh PA USA","acronym":"IoTDI '17","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","IEEE CS"]},"container-title":["Proceedings of the Second International Conference on Internet-of-Things Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3054977.3054999","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3054977.3054999","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3054977.3054999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:44Z","timestamp":1750217804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3054977.3054999"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,18]]},"references-count":21,"alternative-id":["10.1145\/3054977.3054999","10.1145\/3054977"],"URL":"https:\/\/doi.org\/10.1145\/3054977.3054999","relation":{},"subject":[],"published":{"date-parts":[[2017,4,18]]},"assertion":[{"value":"2017-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}