{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:41Z","timestamp":1750306121051,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T00:00:00Z","timestamp":1492473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,18]]},"DOI":"10.1145\/3054977.3057312","type":"proceedings-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T12:27:04Z","timestamp":1492432024000},"page":"339-340","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Detecting Abnormalities in IoT Program Executions through Control-Flow-Based Features"],"prefix":"10.1145","author":[{"given":"Akash","family":"Agarwal","sequence":"first","affiliation":[{"name":"SensorHound, Inc., West Lafayette, Indiana, USA and Purdue University, West Lafayette, Indiana, USA"}]},{"given":"Samuel","family":"Dawson","sequence":"additional","affiliation":[{"name":"SensorHound, Inc., West Lafayette, Indiana, USA and Purdue University, West Lafayette, Indiana, USA"}]},{"given":"Derrick","family":"McKee","sequence":"additional","affiliation":[{"name":"SensorHound, Inc., West Lafayette, Indiana, USA and Purdue University, West Lafayette, Indiana, USA"}]},{"given":"Patrick","family":"Eugster","sequence":"additional","affiliation":[{"name":"SensorHound, Inc., West Lafayette, Indiana, USA and Purdue University, West Lafayette, Indiana, USA and TU Darmstadt, Darmstadt, Germany"}]},{"given":"Matthew","family":"Tancreti","sequence":"additional","affiliation":[{"name":"SensorHound, Inc., West Lafayette, Indiana, USA"}]},{"given":"Vinaitheerthan","family":"Sundaram","sequence":"additional","affiliation":[{"name":"SensorHound, Inc., West Lafayette, Indiana, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1996.566449"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199328"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"D. Gao M. K. Reiter and D. Song. 2009. Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. IEEE TDSC (2009).  D. Gao M. K. Reiter and D. Song. 2009. Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. IEEE TDSC (2009).","DOI":"10.1109\/TDSC.2008.39"},{"key":"e_1_3_2_1_5_1","unstructured":"J. T. Giffin S. Jha and B. P. Miller. 2004. Efficient Context-sensitive Intrusion Detection. In NDSS.  J. T. Giffin S. Jha and B. P. Miller. 2004. Efficient Context-sensitive Intrusion Detection. In NDSS."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972764.10"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"V. Sundaram P. Eugster X. Zhang and V. Addanki. 2013. Diagnostic Tracing for Wireless Sensor Networks. ACM TOSN (2013).  V. Sundaram P. Eugster X. Zhang and V. Addanki. 2013. Diagnostic Tracing for Wireless Sensor Networks. ACM TOSN (2013).","DOI":"10.1145\/2489253.2489255"},{"key":"e_1_3_2_1_8_1","unstructured":"C. Warrender S. Forrest and B. Pearlmutter. 1999. Detecting Intrusions Using System Calls: Alternative Data Models. In IEEE S&P.  C. Warrender S. Forrest and B. Pearlmutter. 1999. Detecting Intrusions Using System Calls: Alternative Data Models. In IEEE S&P."},{"key":"e_1_3_2_1_9_1","volume-title":"Intrusion Detection: Anomaly Detection vs. Classification. In ACM AISec.","author":"Wressnegger C.","year":"2013","unstructured":"C. Wressnegger , G. Schwenk , D. Arp , and K. Rieck . 2013 . A Close Look on N-grams in Intrusion Detection: Anomaly Detection vs. Classification. In ACM AISec. C. Wressnegger, G. Schwenk, D. Arp, and K. Rieck. 2013. A Close Look on N-grams in Intrusion Detection: Anomaly Detection vs. Classification. In ACM AISec."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"K. Xu K. Tian D. Yao and B. G. Ryder. 2016. A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity. In IEEE DSN.  K. Xu K. Tian D. Yao and B. G. Ryder. 2016. A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity. In IEEE DSN.","DOI":"10.1109\/DSN.2016.49"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.37"},{"volume-title":"Learning from Sequential Data for Anomaly Detection","author":"Yolacan E. N.","key":"e_1_3_2_1_12_1","unstructured":"E. N. Yolacan . 2014. Learning from Sequential Data for Anomaly Detection . In Northeastern University , Boston, Massachusetts . E. N. Yolacan. 2014. Learning from Sequential Data for Anomaly Detection. In Northeastern University, Boston, Massachusetts."}],"event":{"name":"IoTDI '17: International Conference on Internet-of-Things Design and Implementation","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","IEEE CS"],"location":"Pittsburgh PA USA","acronym":"IoTDI '17"},"container-title":["Proceedings of the Second International Conference on Internet-of-Things Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3054977.3057312","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3054977.3057312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:44Z","timestamp":1750217804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3054977.3057312"}},"subtitle":["Poster Abstract"],"short-title":[],"issued":{"date-parts":[[2017,4,18]]},"references-count":12,"alternative-id":["10.1145\/3054977.3057312","10.1145\/3054977"],"URL":"https:\/\/doi.org\/10.1145\/3054977.3057312","relation":{},"subject":[],"published":{"date-parts":[[2017,4,18]]},"assertion":[{"value":"2017-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}