{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:12:14Z","timestamp":1760202734560,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T00:00:00Z","timestamp":1497744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,18]]},"DOI":"10.1145\/3061639.3072957","type":"proceedings-article","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T12:18:42Z","timestamp":1497356322000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Safety Guard"],"prefix":"10.1145","author":[{"given":"Meng","family":"Wu","sequence":"first","affiliation":[{"name":"Virginia Tech, USA"}]},{"given":"Haibo","family":"Zeng","sequence":"additional","affiliation":[{"name":"Virginia Tech, USA"}]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Southern California, USA"}]},{"given":"Huafeng","family":"Yu","sequence":"additional","affiliation":[{"name":"Boeing Research &amp; Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A Methodology of N-Version Programming. Software fault tolerance 3","author":"Avizienis A","year":"1995","unstructured":"Algirdas A Avizienis . 1995. A Methodology of N-Version Programming. Software fault tolerance 3 ( 1995 ), 23--46. Algirdas A Avizienis. 1995. A Methodology of N-Version Programming. Software fault tolerance 3 (1995), 23--46."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2011.08.007"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46681-0_51"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2012.27"},{"key":"e_1_3_2_1_5_1","unstructured":"Ruchir Chauhan. 2014.\n  A Platform for False Data Injection in Frequency Modulated Continuous Wave Radar\n  . Ph.D. Dissertation. \n  Utah State University\n  .  Ruchir Chauhan. 2014. A Platform for False Data Injection in Frequency Modulated Continuous Wave Radar. Ph.D. Dissertation. Utah State University."},{"key":"e_1_3_2_1_6_1","unstructured":"E. Clarke O. Grumberg and D. Peled. 1999. Model checking. MIT press.   E. Clarke O. Grumberg and D. Peled. 1999. Model checking. MIT press."},{"volume-title":"RV-ECU: Maximum Assurance In-Vehicle Safety Monitoring. In SAE World Congress.","author":"Daian P.","key":"e_1_3_2_1_7_1","unstructured":"P. Daian , S. Shiraishi , A. Iwai , B. Manja , and G. Rosu . 2016 . RV-ECU: Maximum Assurance In-Vehicle Safety Monitoring. In SAE World Congress. P. Daian, S. Shiraishi, A. Iwai, B. Manja, and G. Rosu. 2016. RV-ECU: Maximum Assurance In-Vehicle Safety Monitoring. In SAE World Congress."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2072511"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302672"},{"key":"e_1_3_2_1_10_1","volume-title":"VIS: A System for Verification and Synthesis. In International Conference on Computer Aided Verification.","author":"Brayton R. K.","year":"1996","unstructured":"R. K. Brayton 1996 . VIS: A System for Verification and Synthesis. In International Conference on Computer Aided Verification. R. K. Brayton et al. 1996. VIS: A System for Verification and Synthesis. In International Conference on Computer Aided Verification."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"F. Sagstetter etal 2013. Security Challenges in Automotive Hardware\/Software Architecture Design. In Design Automation and Test in Europe.   F. Sagstetter et al. 2013. Security Challenges in Automotive Hardware\/Software Architecture Design. In Design Automation and Test in Europe.","DOI":"10.7873\/DATE.2013.102"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-011-0196-8"},{"volume-title":"Network and Distributed System Security Symposium.","author":"Francillon A.","key":"e_1_3_2_1_13_1","unstructured":"A. Francillon , B. Danev , S. Capkun , S. Capkun , and S. Capkun . 2011. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars .. In Network and Distributed System Security Symposium. A. Francillon, B. Danev, S. Capkun, S. Capkun, and S. Capkun. 2011. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars.. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_14_1","unstructured":"Greg Gardner. 2016. GM recalls 4.3M vehicles to fix air bag software. USA Today.  Greg Gardner. 2016. GM recalls 4.3M vehicles to fix air bag software. USA Today."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2014.6813943"},{"volume-title":"The Spin Model Checker: Primer and Reference Manual","key":"e_1_3_2_1_16_1","unstructured":"Gerard Holzmann. 2003. The Spin Model Checker: Primer and Reference Manual ( first ed.). Addison-Wesley Professional . Gerard Holzmann. 2003. The Spin Model Checker: Primer and Reference Manual (first ed.). Addison-Wesley Professional."},{"volume-title":"Fundamentals of error-correcting codes","author":"Cary Huffman W","key":"e_1_3_2_1_17_1","unstructured":"W Cary Huffman and Vera Pless. 2003. Fundamentals of error-correcting codes . Cambridge university press . W Cary Huffman and Vera Pless. 2003. Fundamentals of error-correcting codes. Cambridge university press."},{"key":"e_1_3_2_1_18_1","volume-title":"Security and Privacy Vulnerabilities of In-car Wireless Networks: A Tire Pressure Monitoring System Case Study. In 19th USENIX Conference on Security.","author":"Rouf I.","year":"2010","unstructured":"I. Rouf 2010 . Security and Privacy Vulnerabilities of In-car Wireless Networks: A Tire Pressure Monitoring System Case Study. In 19th USENIX Conference on Security. I. Rouf et al. 2010. Security and Privacy Vulnerabilities of In-car Wireless Networks: A Tire Pressure Monitoring System Case Study. In 19th USENIX Conference on Security."},{"key":"e_1_3_2_1_19_1","volume-title":"Safety Agency Says 22 Million Vehicles Recalled","author":"Jensen C.","year":"2013","unstructured":"C. Jensen . Safety Agency Says 22 Million Vehicles Recalled in 2013 . The New York Times . C. Jensen. Safety Agency Says 22 Million Vehicles Recalled in 2013. The New York Times."},{"key":"e_1_3_2_1_20_1","unstructured":"C. Jensen. 2015. A Record Year of Recalls: Nearly 64 Million Vehicles. The New York Times.  C. Jensen. 2015. A Record Year of Recalls: Nearly 64 Million Vehicles. The New York Times."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2562059.2562140"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_23_1","unstructured":"Aaron Kane. 2015.\n  Runtime Monitoring for Safety-Critical Embedded Systems\n  . Ph.D. Dissertation. \n  Carnegie Mellon University\n  .  Aaron Kane. 2015. Runtime Monitoring for Safety-Critical Embedded Systems. Ph.D. Dissertation. Carnegie Mellon University."},{"key":"e_1_3_2_1_24_1","unstructured":"Leo King. 2011. Jaguar recalls 18 000 cars over cruise control software fault. Computer World UK.  Leo King. 2011. Jaguar recalls 18 000 cars over cruise control software fault. Computer World UK."},{"key":"e_1_3_2_1_25_1","unstructured":"V. Kljaic. 2015. New Security Breach: Hacked Cars Force Recalls. Auto VR World.  V. Kljaic. 2015. New Security Breach: Hacked Cars Force Recalls. Auto VR World."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.62.0200"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656075.2656096"},{"key":"e_1_3_2_1_29_1","unstructured":"Charlie Miller and Chris Valasek. 2013. Adventures in Automotive Networks and Control Units. In DEFCON 21.  Charlie Miller and Chris Valasek. 2013. Adventures in Automotive Networks and Control Units. In DEFCON 21."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"M. Di Natale and H. Zeng. 2012. Task implementation of synchronous finite state machines. In Design Automation & Test in Europe.   M. Di Natale and H. Zeng. 2012. Task implementation of synchronous finite state machines. In Design Automation & Test in Europe.","DOI":"10.1109\/DATE.2012.6176464"},{"key":"e_1_3_2_1_31_1","volume-title":"NHTSA Announces More Than 17.8 Million Products Recalled","author":"NHTSA.","year":"2012","unstructured":"NHTSA. NHTSA Announces More Than 17.8 Million Products Recalled in 2012 . NHTSA. NHTSA. NHTSA Announces More Than 17.8 Million Products Recalled in 2012. NHTSA."},{"key":"e_1_3_2_1_32_1","unstructured":"NHTSA 2011. Honda: RECALL Subject: Automatic Transmission Control Module Software. NHTSA.  NHTSA 2011. Honda: RECALL Subject: Automatic Transmission Control Module Software. NHTSA."},{"volume-title":"49 CFR Part 571: Federal Motor Vehicle Safety Standards","author":"SA.","key":"e_1_3_2_1_33_1","unstructured":"NHT SA. 2012. 49 CFR Part 571: Federal Motor Vehicle Safety Standards ; Accelerator Control Systems. Department of Transportation . NHTSA. 2012. 49 CFR Part 571: Federal Motor Vehicle Safety Standards; Accelerator Control Systems. Department of Transportation."},{"key":"e_1_3_2_1_34_1","unstructured":"NHTSA 2013. Honda: RECALL Subject: Brakes may Unexpectedly Apply. NHTSA.  NHTSA 2013. Honda: RECALL Subject: Brakes may Unexpectedly Apply. NHTSA."},{"key":"e_1_3_2_1_35_1","unstructured":"NHTSA 2014. Ford: RECALL Subject: Side-Curtain Rollover Air Bag Deployment Delay. NHTSA.  NHTSA 2014. Ford: RECALL Subject: Side-Curtain Rollover Air Bag Deployment Delay. NHTSA."},{"key":"e_1_3_2_1_36_1","unstructured":"NHTSA 2015. Ford: RECALL Subject: Engine may Continue to Run\/FMVSS 114. NHTSA.  NHTSA 2015. Ford: RECALL Subject: Engine may Continue to Run\/FMVSS 114. NHTSA."},{"key":"e_1_3_2_1_37_1","unstructured":"NHTSA 2015. Toyota: RECALL Subject: Inverter Failure may cause Hybrid Vehicle to Stall. NHTSA.  NHTSA 2015. Toyota: RECALL Subject: Inverter Failure may cause Hybrid Vehicle to Stall. NHTSA."},{"volume-title":"Conf. Dependable Systems and Networks.","author":"Rashid F.","key":"e_1_3_2_1_38_1","unstructured":"F. Rashid , K. Saluja , and P. Ramanathan . 2000. Fault tolerance through re-execution in multiscalar architecture . In Conf. Dependable Systems and Networks. F. Rashid, K. Saluja, and P. Ramanathan. 2000. Fault tolerance through re-execution in multiscalar architecture. In Conf. Dependable Systems and Networks."},{"key":"e_1_3_2_1_39_1","volume-title":"Remarks: Washington Auto Show keynote address.","author":"Rosekind M.","year":"2016","unstructured":"M. Rosekind . 2016 . Remarks: Washington Auto Show keynote address. M. Rosekind. 2016. Remarks: Washington Auto Show keynote address."},{"key":"e_1_3_2_1_40_1","first-page":"210","article-title":"Kernels for Safety? In Safe and Secure Computing Systems, T. Anderson (Ed.). Blackwell Scientific Publications","volume":"13","year":"1989","unstructured":"John Rushby. 1989 . Kernels for Safety? In Safe and Secure Computing Systems, T. Anderson (Ed.). Blackwell Scientific Publications , Chapter 13 , 210 -- 220 . John Rushby. 1989. Kernels for Safety? In Safe and Secure Computing Systems, T. Anderson (Ed.). Blackwell Scientific Publications, Chapter 13, 210--220.","journal-title":"Chapter"},{"key":"e_1_3_2_1_41_1","volume-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces. In 20th USENIX Conference on Security.","author":"Checkoway S.","year":"2011","unstructured":"S. Checkoway 2011 . Comprehensive Experimental Analyses of Automotive Attack Surfaces. In 20th USENIX Conference on Security. S. Checkoway et al. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces. In 20th USENIX Conference on Security."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"e_1_3_2_1_43_1","unstructured":"Jason Staggs. 2013. How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles. In DEFCON 21.  Jason Staggs. 2013. How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles. In DEFCON 21."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2012.13"},{"key":"e_1_3_2_1_45_1","unstructured":"Jacqui Trotta. Mercedes has the Lowest \"Recall Rate\" and BMW is the Most Timely in Making Recalls. iSeeCars.  Jacqui Trotta. Mercedes has the Lowest \"Recall Rate\" and BMW is the Most Timely in Making Recalls. iSeeCars."},{"key":"e_1_3_2_1_46_1","volume-title":"Protection of Intellectual Property Rights in Automotive Control Units. Society of Automotive Engineers World Congress","author":"Wasicek A.","year":"2014","unstructured":"A. Wasicek . 2014 . Protection of Intellectual Property Rights in Automotive Control Units. Society of Automotive Engineers World Congress (2014). A. Wasicek. 2014. Protection of Intellectual Property Rights in Automotive Control Units. Society of Automotive Engineers World Congress (2014)."},{"key":"e_1_3_2_1_47_1","unstructured":"Wikipedia. 2009-11 Toyota vehicle recalls. Wikipedia.  Wikipedia. 2009-11 Toyota vehicle recalls. Wikipedia."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40648-0_6"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2421907"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.4271\/2016-01-0050"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2012.30"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Q. Zhu P. Deng M. Di Natale and H. Zeng. 2013. Robust and extensible task implementations of synchronous finite state machines. In Design Automation and Test in Europe.   Q. Zhu P. Deng M. Di Natale and H. Zeng. 2013. Robust and extensible task implementations of synchronous finite state machines. In Design Automation and Test in Europe.","DOI":"10.7873\/DATE.2013.272"}],"event":{"name":"DAC '17: The 54th Annual Design Automation Conference 2017","sponsor":["EDAC Electronic Design Automation Consortium","SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Austin TX USA","acronym":"DAC '17"},"container-title":["Proceedings of the 54th Annual Design Automation Conference 2017"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3061639.3072957","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3061639.3072957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:27Z","timestamp":1750215807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3061639.3072957"}},"subtitle":["Runtime Enforcement for Safety-Critical Cyber-Physical Systems: Invited"],"short-title":[],"issued":{"date-parts":[[2017,6,18]]},"references-count":51,"alternative-id":["10.1145\/3061639.3072957","10.1145\/3061639"],"URL":"https:\/\/doi.org\/10.1145\/3061639.3072957","relation":{},"subject":[],"published":{"date-parts":[[2017,6,18]]},"assertion":[{"value":"2017-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}