{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T02:20:03Z","timestamp":1766888403629,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,15]],"date-time":"2017-10-15T00:00:00Z","timestamp":1508025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1319841"],"award-info":[{"award-number":["1319841"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000014-15-12182"],"award-info":[{"award-number":["N000014-15-12182"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,15]]},"DOI":"10.1145\/3125501.3125529","type":"proceedings-article","created":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T12:37:48Z","timestamp":1508157468000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Emerging (un-)reliability based security threats and mitigations for embedded systems"],"prefix":"10.1145","author":[{"given":"Hussam","family":"Amrouch","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"given":"Prashanth","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"NYU Tandon School of Engineering"}]},{"given":"Naman","family":"Patel","sequence":"additional","affiliation":[{"name":"NYU Tandon School of Engineering"}]},{"given":"J\u00f6rg","family":"Henkel","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[{"name":"NYU Tandon School of Engineering"}]},{"given":"Farshad","family":"Khorrami","sequence":"additional","affiliation":[{"name":"NYU Tandon School of Engineering"}]}],"member":"320","published-online":{"date-parts":[[2017,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. Cyanogenmod forum. http:\/\/forum.cyanogenmod.com\/ (last accessed 10 Feb. 2014). (2014).  2014. Cyanogenmod forum. http:\/\/forum.cyanogenmod.com\/ (last accessed 10 Feb. 2014). (2014)."},{"key":"e_1_3_2_1_2_1","unstructured":"2014. ICS-CERT year in review - 2014. [Online]: https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/Annual_Reports\/Year_in_Review_FY2014_Final.pdf. (2014).  2014. ICS-CERT year in review - 2014. [Online]: https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/Annual_Reports\/Year_in_Review_FY2014_Final.pdf. (2014)."},{"key":"e_1_3_2_1_3_1","unstructured":"2015. NCCIC\/ICS-CERT Year in Review - 2015. [Online]: https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/Annual_Reports\/Year_in_Review_FY2015_Final_S508C.pdf. (2015).  2015. NCCIC\/ICS-CERT Year in Review - 2015. [Online]: https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/Annual_Reports\/Year_in_Review_FY2015_Final_S508C.pdf. (2015)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2003.1232254"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISLPED.2015.7273538"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898082"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRPS.2015.7112711"},{"volume-title":"IEEE Reliability Physics Symposium (IRPS). CR-3.1--CR-3.6.","author":"Amrouch H.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2014.7001394"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2594180"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2015.2501310"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2015.7256167"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2006.320885"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_30"},{"key":"e_1_3_2_1_16_1","unstructured":"C. Blask. 2011. ICS Cybersecurity: Water water everywhere. [Online]: http:\/\/www.infosecisland.com\/blogview\/18281-ICS-Cybersecurity-Water-Water-Everywhere.html. (Nov 2011).  C. Blask. 2011. ICS Cybersecurity: Water water everywhere. [Online]: http:\/\/www.infosecisland.com\/blogview\/18281-ICS-Cybersecurity-Water-Water-Everywhere.html. (Nov 2011)."},{"volume-title":"IEEE Applied Power Electronics Conference and Exposition (APEC). 432--439","author":"Burton E.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","first-page":"213","article-title":"The myths and facts behind cyber security risks for industrial control systems","volume":"116","author":"Byres E.","year":"2004","journal-title":"The VDE Kongress"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.39"},{"volume-title":"Research Challenges for the Security of Control Systems. In 3rd USENIX workshop on Hot Topics in Security.","author":"C\u00e1rdenas A.","key":"e_1_3_2_1_20_1"},{"volume-title":"Workshop on future directions in cyber-physical systems security.","year":"2009","author":"C\u00e1rdenas A.","key":"e_1_3_2_1_21_1"},{"volume-title":"International Symposium of Foundations and Practice of Security. Springer, 3--16","author":"Carrara B.","key":"e_1_3_2_1_22_1"},{"volume-title":"International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 13--28","author":"Chari S.","key":"e_1_3_2_1_23_1"},{"volume-title":"USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies. 9--9.","author":"Clark S. S.","key":"e_1_3_2_1_24_1"},{"volume-title":"International Workshop on Cryptographic Hardware and Embedded Systems (CHES). Springer, 15--29","author":"Dakshi A.","key":"e_1_3_2_1_25_1"},{"volume-title":"Practical Electro-Magnetic Analysis. In Non-invasive Attack Testing Workshop NIAT","author":"Debeer F.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","unstructured":"N. Falliere L. Murchu and E. Chien. 2011. W32. Stuxnet dossier. White paper Symantec Corp. Security Response 5 (2011).  N. Falliere L. Murchu and E. Chien. 2011. W32. Stuxnet dossier. White paper Symantec Corp. Security Response 5 (2011)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_6"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRPS.2015.7112725"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21476-4_17"},{"volume-title":"USENIX Security Symposium. 849--864","author":"Guri M.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2014.6999418"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.26"},{"key":"e_1_3_2_1_36_1","unstructured":"H.Amrouch and J. Henkel. 2016. KIT short-term aging models tools and degradation-aware cell libraries. http:\/\/ces.itec.kit.edu\/dependable-hardware.php. (2016).  H.Amrouch and J. Henkel. 2016. KIT short-term aging models tools and degradation-aware cell libraries. http:\/\/ces.itec.kit.edu\/dependable-hardware.php. (2016)."},{"key":"e_1_3_2_1_37_1","unstructured":"M. Hanspach and M. Goetz. 2014. On covert acoustical mesh networks in air. arXiv preprint arXiv:1406.1213 (2014).  M. Hanspach and M. Goetz. 2014. On covert acoustical mesh networks in air. arXiv preprint arXiv:1406.1213 (2014)."},{"volume-title":"International Conference on Smart Card Research and Advanced Applications. Springer, 219--235","author":"Hutter M.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2724718"},{"volume":"7055","volume-title":"International Workshop on RFID. Security and Privacy.","author":"Kasper T.","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2010.2040125"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2016.7805855"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2011.49"},{"key":"e_1_3_2_1_44_1","unstructured":"F. Khorrami R. Karri and P. Krishnamurthy. 2017. Instrumenting Code for Embedded Controlled Remote Autonomous Monitoring. (Jan 2017).  F. Khorrami R. Karri and P. Krishnamurthy. 2017. Instrumenting Code for Embedded Controlled Remote Autonomous Monitoring. (Jan 2017)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2594178"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-08788-6"},{"key":"e_1_3_2_1_47_1","unstructured":"E. Kovacs. 2014. Cyberattack on German Steel Plant Caused Significant Damage. [Online]: http:\/\/www.securityweek.com\/cyberattack-german-steel-plant-causes-significant-damage-report. (Dec 2014).  E. Kovacs. 2014. Cyberattack on German Steel Plant Caused Significant Damage. [Online]: http:\/\/www.securityweek.com\/cyberattack-german-steel-plant-causes-significant-damage-report. (Dec 2014)."},{"key":"e_1_3_2_1_48_1","unstructured":"D. Kravets. 2009. Feds: Hacker Disabled Offshore Oil Platforms' Leak-Detection System. [Online]: http:\/\/www.wired.com\/2009\/03\/feds-hacker-dis\/. (Mar 2009).  D. Kravets. 2009. Feds: Hacker Disabled Offshore Oil Platforms' Leak-Detection System. [Online]: http:\/\/www.wired.com\/2009\/03\/feds-hacker-dis\/. (Mar 2009)."},{"key":"e_1_3_2_1_49_1","unstructured":"P. Krishnamurthy F. Khorrami R. Karri D. Paul-Pena and H. Salehghaffari. 2017. Process-aware side-channel information leakage from physical instrumentation\/devices in cyber-physical systems. (2017). submitted for journal publication.  P. Krishnamurthy F. Khorrami R. Karri D. Paul-Pena and H. Salehghaffari. 2017. Process-aware side-channel information leakage from physical instrumentation\/devices in cyber-physical systems. (2017). submitted for journal publication."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"D. Kushner. 2013. The Real Story of Stuxnet. [Online]: http:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet. (Feb. 2013).  D. Kushner. 2013. The Real Story of Stuxnet. [Online]: http:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet. (Feb. 2013).","DOI":"10.1109\/MSPEC.2013.6471059"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_21"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_3"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"volume-title":"International Conference on Information Security and Cryptology. Springer, 471--486","author":"Meynard O.","key":"e_1_3_2_1_54_1"},{"key":"e_1_3_2_1_55_1","unstructured":"C. Mims. 2013. If it ain't broke of course Apple is engaging in planned obsolescence. http:\/\/qz.com\/141297\/of-courseapple-is-engaging-in-planned-obsolescence. (2013).  C. Mims. 2013. If it ain't broke of course Apple is engaging in planned obsolescence. http:\/\/qz.com\/141297\/of-courseapple-is-engaging-in-planned-obsolescence. (2013)."},{"key":"e_1_3_2_1_56_1","unstructured":"Oracle. 2006. OpenSPARC T1. http:\/\/www.oracle.com\/technetwork\/systems\/opensparc\/opensparc-t1-page-1444609.html. (2006).  Oracle. 2006. OpenSPARC T1. http:\/\/www.oracle.com\/technetwork\/systems\/opensparc\/opensparc-t1-page-1444609.html. (2006)."},{"key":"e_1_3_2_1_57_1","unstructured":"N. Patel P. Krishnamurthy H. Amrouch J. Henkel M. Shamouilian R. Karri and F. Khorrami. 2017. Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security. (2017). submitted for journal publication.  N. Patel P. Krishnamurthy H. Amrouch J. Henkel M. Shamouilian R. Karri and F. Khorrami. 2017. Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security. (2017). submitted for journal publication."},{"volume-title":"IFIP\/IEEE International Conference on Very Large Scale Integration (VLSI-SoC).","author":"Paul-Pena D.","key":"e_1_3_2_1_58_1"},{"key":"e_1_3_2_1_59_1","unstructured":"C. Rampell. 2013. Cracking the Apple trap. http:\/\/www.nytimes.com\/2013\/11\/03\/magazine\/why-apple-wants-to-bust-your-iphone.html. (2013).  C. Rampell. 2013. Cracking the Apple trap. http:\/\/www.nytimes.com\/2013\/11\/03\/magazine\/why-apple-wants-to-bust-your-iphone.html. (2013)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31815-6_35"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIIW.2012.6378346"},{"volume-title":"Mysterious '08 Turkey pipeline blast opened new cyberwar. [Online]: http:\/\/www.bloomberg.com\/news\/articles\/2014-12-10\/mysterious-08-turkey-pipeline-blast-opened-new-cyberwar. (Dec","year":"2014","author":"Robertson J.","key":"e_1_3_2_1_62_1"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICDT.2011.5783193"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71817-0_14"},{"key":"e_1_3_2_1_65_1","unstructured":"M. Rosoff. 2012. Microsoft: Apple makes old iPhones 'unusably slow' on purpose. (2012). http:\/\/www.businessinsider.com\/microsoft-apple-makes-old-iphones-unusably-slow-on-purpose-2012-3  M. Rosoff. 2012. Microsoft: Apple makes old iPhones 'unusably slow' on purpose. (2012). http:\/\/www.businessinsider.com\/microsoft-apple-makes-old-iphones-unusably-slow-on-purpose-2012-3"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2003.1232254"},{"key":"e_1_3_2_1_67_1","unstructured":"H. Skipworth. 2012. The myth of the Sony kill switch. http:\/\/www.telegraph.co.uk\/technology\/news\/7054587\/Themyth-of-the-Sony-kill-switch.html. (2012).  H. Skipworth. 2012. The myth of the Sony kill switch. http:\/\/www.telegraph.co.uk\/technology\/news\/7054587\/Themyth-of-the-Sony-kill-switch.html. (2012)."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71829-3_2"},{"key":"e_1_3_2_1_69_1","unstructured":"R. J. Turk. 2005. Cyber Incidents Involving Control Systems. [Online]: https:\/\/inldigitallibrary.inl.gov\/sti\/3480144.pdf. (Oct. 2005).  R. J. Turk. 2005. Cyber Incidents Involving Control Systems. [Online]: https:\/\/inldigitallibrary.inl.gov\/sti\/3480144.pdf. (Oct. 2005)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.3850\/9783981537079_0751"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2717790"},{"volume-title":"Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. In USENIX Security Symposium. 1--16","author":"Vuagnoux M.","key":"e_1_3_2_1_72_1"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2008810"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488831"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2474374"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372617"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.1984.1052209"},{"key":"e_1_3_2_1_78_1","unstructured":"T. Worstall. 2013. Certainly there is planned obsolescence in Apple's iKit it is just not planned by Apple. http:\/\/www.forbes.com\/sites\/timworstall\/2013\/10\/31\/certainly-theres-planned-obsolescence-in-apples-ikit-its-just-not-planned-by-apple. (2013).  T. Worstall. 2013. Certainly there is planned obsolescence in Apple's iKit it is just not planned by Apple. http:\/\/www.forbes.com\/sites\/timworstall\/2013\/10\/31\/certainly-theres-planned-obsolescence-in-apples-ikit-its-just-not-planned-by-apple. (2013)."}],"event":{"name":"ESWEEK'17: THIRTEENTH EMBEDDED SYSTEM WEEK","acronym":"ESWEEK'17","location":"Seoul Republic of Korea"},"container-title":["Proceedings of the 2017 International Conference on Compilers, Architectures and Synthesis for Embedded Systems Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3125501.3125529","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3125501.3125529","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3125501.3125529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:24Z","timestamp":1750212684000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3125501.3125529"}},"subtitle":["special session"],"short-title":[],"issued":{"date-parts":[[2017,10,15]]},"references-count":78,"alternative-id":["10.1145\/3125501.3125529","10.1145\/3125501"],"URL":"https:\/\/doi.org\/10.1145\/3125501.3125529","relation":{},"subject":[],"published":{"date-parts":[[2017,10,15]]},"assertion":[{"value":"2017-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}