{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:19Z","timestamp":1750306099070,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,14]],"date-time":"2017-10-14T00:00:00Z","timestamp":1507939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,14]]},"DOI":"10.1145\/3123939.3123955","type":"proceedings-article","created":{"date-parts":[[2017,11,20]],"date-time":"2017-11-20T14:31:12Z","timestamp":1511188272000},"page":"328-340","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Software-based gate-level information flow security for IoT systems"],"prefix":"10.1145","author":[{"given":"Hari","family":"Cherupalli","sequence":"first","affiliation":[{"name":"University of Minnesota"}]},{"given":"Henry","family":"Duwe","sequence":"additional","affiliation":[{"name":"Iowa State University"}]},{"given":"Weidong","family":"Ye","sequence":"additional","affiliation":[{"name":"University of Illinois"}]},{"given":"Rakesh","family":"Kumar","sequence":"additional","affiliation":[{"name":"University of Illinois"}]},{"given":"John","family":"Sartori","sequence":"additional","affiliation":[{"name":"University of Minnesota"}]}],"member":"320","published-online":{"date-parts":[[2017,10,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Hacking iot: A case study on baby monitor exposures and vulnerabilities","author":"Stanislav M.","year":"2015","unstructured":"M. Stanislav and T. Beardsley , \" Hacking iot: A case study on baby monitor exposures and vulnerabilities ,\" 2015 . M. Stanislav and T. Beardsley, \"Hacking iot: A case study on baby monitor exposures and vulnerabilities,\" 2015."},{"key":"e_1_3_2_1_2_1","volume-title":"Remote exploitation of an unaltered passenger vehicle,\" Black Hat USA","author":"Miller C.","year":"2015","unstructured":"C. Miller and C. Valasek , \" Remote exploitation of an unaltered passenger vehicle,\" Black Hat USA , vol. 2015 , 2015 . C. Miller and C. Valasek, \"Remote exploitation of an unaltered passenger vehicle,\" Black Hat USA, vol. 2015, 2015."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2667218"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.29"},{"key":"e_1_3_2_1_8_1","volume-title":"analysis, and signature generation of exploits on commodity software","author":"Newsome J.","year":"2005","unstructured":"J. Newsome , \" Dynamic taint analysis for automatic detection , analysis, and signature generation of exploits on commodity software ,\" 2005 . J. Newsome, \"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software,\" 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"e_1_3_2_1_10_1","volume-title":"Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks,\" in Proceedings of the 15th Conference on USENIX Security Symposium -","author":"Xu W.","year":"2006","unstructured":"W. Xu , S. Bhatkar , and R. Sekar , \" Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks,\" in Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15 , USENIX-SS'06, (Berkeley, CA, USA), USENIX Association , 2006 . W. Xu, S. Bhatkar, and R. Sekar, \"Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks,\" in Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, USENIX-SS'06, (Berkeley, CA, USA), USENIX Association, 2006."},{"key":"e_1_3_2_1_11_1","volume-title":"Cross-site scripting prevention with dynamic data tainting and static analysis,\" in In Proceeding of the Network and Distributed System Security Symposium (NDSS'07","author":"Nentwich F.","year":"2007","unstructured":"F. Nentwich , N. Jovanovic , E. Kirda , C. Kruegel , and G. Vigna , \" Cross-site scripting prevention with dynamic data tainting and static analysis,\" in In Proceeding of the Network and Distributed System Security Symposium (NDSS'07 , 2007 . F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna, \"Cross-site scripting prevention with dynamic data tainting and static analysis,\" in In Proceeding of the Network and Distributed System Security Symposium (NDSS'07, 2007."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250722"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.20"},{"key":"e_1_3_2_1_14_1","first-page":"173","volume-title":"Flexitaint: A programmable accelerator for dynamic taint propagation,\" in 2008 IEEE 14th International Symposium on High Performance Computer Architecture","author":"Venkataramani G.","year":"2008","unstructured":"G. Venkataramani , I. Doudalis , Y. Solihin , and M. Prvulovic , \" Flexitaint: A programmable accelerator for dynamic taint propagation,\" in 2008 IEEE 14th International Symposium on High Performance Computer Architecture , pp. 173 -- 184 , Feb 2008 . G. Venkataramani, I. Doudalis, Y. Solihin, and M. Prvulovic, \"Flexitaint: A programmable accelerator for dynamic taint propagation,\" in 2008 IEEE 14th International Symposium on High Performance Computer Architecture, pp. 173--184, Feb 2008."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.18"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508284.1508258"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2189105"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669174"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000087"},{"key":"e_1_3_2_1_20_1","unstructured":"\"Products with an MSP430.\" http:\/\/43oh.com\/2012\/03\/winner-products-using-the-msp430\/.  \"Products with an MSP430.\" http:\/\/43oh.com\/2012\/03\/winner-products-using-the-msp430\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993512"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541947"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694372"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037739"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"e_1_3_2_1_26_1","first-page":"25","volume-title":"Proceedings. Sixth IEEE International","author":"Hamaguchi K.","year":"2001","unstructured":"K. Hamaguchi , \"Symbolic simulation heuristics for high-level design descriptions with uninterpreted functions,\" in High-Level Design Validation and Test Workshop, 2001 . Proceedings. Sixth IEEE International , pp. 25 -- 30 , 2001 . K. Hamaguchi, \"Symbolic simulation heuristics for high-level design descriptions with uninterpreted functions,\" in High-Level Design Validation and Test Workshop, 2001. Proceedings. Sixth IEEE International, pp. 25--30, 2001."},{"key":"e_1_3_2_1_27_1","unstructured":"\"International Technology Roadmap for Semiconductors 2.0 2015 Edition Executive Report.\" http:\/\/www.semiconductors.org\/main\/2015_international_technology_-roadmap_for_semiconductors_itrs\/.  \"International Technology Roadmap for Semiconductors 2.0 2015 Edition Executive Report.\" http:\/\/www.semiconductors.org\/main\/2015_international_technology_-roadmap_for_semiconductors_itrs\/."},{"key":"e_1_3_2_1_28_1","volume-title":"Market Estimates And Forecasts,\" Forbes","author":"Press G.","year":"2014","unstructured":"G. Press , \" Internet of Things By The Numbers : Market Estimates And Forecasts,\" Forbes , 2014 . G. Press, \"Internet of Things By The Numbers: Market Estimates And Forecasts,\" Forbes, 2014."},{"key":"e_1_3_2_1_29_1","unstructured":"O. Girard \"OpenMSP430 project \" available at opencores.org 2013.  O. Girard \"OpenMSP430 project \" available at opencores.org 2013."},{"key":"e_1_3_2_1_30_1","unstructured":"Wikipedia \"List of wireless sensor nodes \" 2016. {Online; accessed 7-April-2016}.  Wikipedia \"List of wireless sensor nodes \" 2016. {Online; accessed 7-April-2016}."},{"key":"e_1_3_2_1_31_1","volume-title":"TI slashes total MCU power by 50 percent with new \"Wolverine\" MCU platform,\" Texas Instruments White Paper","author":"Borgeson J.","year":"2012","unstructured":"J. Borgeson , \"Ultra-low-power pioneers : TI slashes total MCU power by 50 percent with new \"Wolverine\" MCU platform,\" Texas Instruments White Paper , 2012 . J. Borgeson, \"Ultra-low-power pioneers: TI slashes total MCU power by 50 percent with new \"Wolverine\" MCU platform,\" Texas Instruments White Paper, 2012."},{"key":"e_1_3_2_1_32_1","unstructured":"Synopsys Design Compiler User Guide.  Synopsys Design Compiler User Guide."},{"key":"e_1_3_2_1_33_1","unstructured":"Cadence Encounter Digital Implementation User Guide.  Cadence Encounter Digital Implementation User Guide."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2007564"},{"key":"e_1_3_2_1_35_1","unstructured":"\"EEMBC Embedded Microprocessor Benchmark Consortium.\" http:\/\/www.eembc.org.  \"EEMBC Embedded Microprocessor Benchmark Consortium.\" http:\/\/www.eembc.org."},{"key":"e_1_3_2_1_36_1","unstructured":"\"The FreeRTOS website.\" http:\/\/www.freertos.org\/.  \"The FreeRTOS website.\" http:\/\/www.freertos.org\/."},{"key":"e_1_3_2_1_37_1","first-page":"189","volume-title":"Networking and Communications (WiMob), 2013 IEEE 9th International Conference on","author":"Magno M.","year":"2013","unstructured":"M. Magno , L. Benini , C. Spagnol , and E. Popovici , \" Wearable low power dry surface wireless sensor node for healthcare monitoring application,\" in Wireless and Mobile Computing , Networking and Communications (WiMob), 2013 IEEE 9th International Conference on , pp. 189 -- 195 , IEEE, 2013 . M. Magno, L. Benini, C. Spagnol, and E. Popovici, \"Wearable low power dry surface wireless sensor node for healthcare monitoring application,\" in Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, pp. 189--195, IEEE, 2013."},{"key":"e_1_3_2_1_38_1","volume-title":"Low Power Wireless Sensor Networks for the Internet of Things: Making Wireless Sensors as Accessible as Web Servers,\" Linear Technology","author":"Yu R.","year":"2013","unstructured":"R. Yu and T. Watteyne , \" Reliable , Low Power Wireless Sensor Networks for the Internet of Things: Making Wireless Sensors as Accessible as Web Servers,\" Linear Technology , 2013 . R. Yu and T. Watteyne, \"Reliable, Low Power Wireless Sensor Networks for the Internet of Things: Making Wireless Sensors as Accessible as Web Servers,\" Linear Technology, 2013."},{"key":"e_1_3_2_1_39_1","first-page":"1","volume-title":"2012 Ninth International Conference on","author":"Dunkels A.","year":"2012","unstructured":"A. Dunkels , J. Eriksson , N. Finne , F. Osterlind , N. Tsiftes , J. Abeill\u00e9 , and M. Durvy , \" Low-Power IPv6 for the internet of things,\" in Networked Sensing Systems (INSS) , 2012 Ninth International Conference on , pp. 1 -- 6 , IEEE, 2012 . A. Dunkels, J. Eriksson, N. Finne, F. Osterlind, N. Tsiftes, J. Abeill\u00e9, and M. Durvy, \"Low-Power IPv6 for the internet of things,\" in Networked Sensing Systems (INSS), 2012 Ninth International Conference on, pp. 1--6, IEEE, 2012."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859471"},{"key":"e_1_3_2_1_41_1","first-page":"241","volume-title":"BioCAS 2006","author":"Park C.","year":"2006","unstructured":"C. Park , P. H. Chou , Y. Bai , R. Matthews , and A. Hibbs , \" An ultra-wearable, wireless, low power ECG monitoring system,\" in Biomedical Circuits and Systems Conference, 2006 . BioCAS 2006 . IEEE, pp. 241 -- 244 , IEEE, 2006 . C. Park, P. H. Chou, Y. Bai, R. Matthews, and A. Hibbs, \"An ultra-wearable, wireless, low power ECG monitoring system,\" in Biomedical Circuits and Systems Conference, 2006. BioCAS 2006. IEEE, pp. 241--244, IEEE, 2006."}],"event":{"name":"MICRO-50: The 50th Annual IEEE\/ACM International Symposium on Microarchitecture","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE-CS\\DATC IEEE Computer Society"],"location":"Cambridge Massachusetts","acronym":"MICRO-50"},"container-title":["Proceedings of the 50th Annual IEEE\/ACM International Symposium on Microarchitecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3123939.3123955","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3123939.3123955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:31Z","timestamp":1750217431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3123939.3123955"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,14]]},"references-count":41,"alternative-id":["10.1145\/3123939.3123955","10.1145\/3123939"],"URL":"https:\/\/doi.org\/10.1145\/3123939.3123955","relation":{},"subject":[],"published":{"date-parts":[[2017,10,14]]},"assertion":[{"value":"2017-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}