{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:35Z","timestamp":1750220015724,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T00:00:00Z","timestamp":1686096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"The Commonwealth Cyber Initiative (CCI) of Virginia"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2038726,1941524,2038995"],"award-info":[{"award-number":["2038726,1941524,2038995"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,7]]},"DOI":"10.1145\/3575757.3575762","type":"proceedings-article","created":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T10:07:46Z","timestamp":1684836466000},"page":"132-142","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Procrastinating Control-Flow Integrity Framework for Periodic Real-Time Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9956-2956","authenticated-orcid":false,"given":"Tanmaya","family":"Mishra","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Virginia Tech, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7533-085X","authenticated-orcid":false,"given":"Jinwen","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Washington University in St. Louis, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5688-5720","authenticated-orcid":false,"given":"Thidapat","family":"Chantem","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Virginia Tech, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0876-1181","authenticated-orcid":false,"given":"Ryan","family":"Gerdes","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Virginia Tech, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0670-2161","authenticated-orcid":false,"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Washington University in St. Louis, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. NuMicro M2351 series \u2013 a TrustZone empowered micro-controller series focusing on iot security.  2019. NuMicro M2351 series \u2013 a TrustZone empowered micro-controller series focusing on iot security."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. Clang 12 documentation. Retrieved 2020-10-24 from https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrity.html  2020. Clang 12 documentation. Retrieved 2020-10-24 from https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrity.html"},{"key":"e_1_3_2_1_3_1","unstructured":"2021. ArduCopter. Retrieved 2021-10-19 from https:\/\/ardupilot.org\/copter\/  2021. ArduCopter. Retrieved 2021-10-19 from https:\/\/ardupilot.org\/copter\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2021. PX4. Retrieved 2021-10-19 from https:\/\/px4.io\/  2021. PX4. Retrieved 2021-10-19 from https:\/\/px4.io\/"},{"key":"e_1_3_2_1_5_1","unstructured":"2021. Rover. Retrieved 2021-10-19 from https:\/\/ardupilot.org\/index.php\/slider\/ArdupilotRovers\/RubidiumRover  2021. Rover. Retrieved 2021-10-19 from https:\/\/ardupilot.org\/index.php\/slider\/ArdupilotRovers\/RubidiumRover"},{"key":"e_1_3_2_1_6_1","unstructured":"2021. TurtleBot. Retrieved 2021-10-19 from https:\/\/www.turtlebot.com\/  2021. TurtleBot. Retrieved 2021-10-19 from https:\/\/www.turtlebot.com\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"N. Almakhdhub Abraham Clements S. Bagchi and M. Payer. 2020. \u00b5RAI: Securing Embedded Systems with Return Address Integrity. In NDSS.  N. Almakhdhub Abraham Clements S. Bagchi and M. Payer. 2020. \u00b5RAI: Securing Embedded Systems with Return Address Integrity. In NDSS.","DOI":"10.14722\/ndss.2020.24016"},{"key":"e_1_3_2_1_8_1","unstructured":"Amazon. 2020. Market leading RTOS (Real Time Operating System) for embedded systems with Internet of Things extensions. https:\/\/www.freertos.org\/  Amazon. 2020. Market leading RTOS (Real Time Operating System) for embedded systems with Internet of Things extensions. https:\/\/www.freertos.org\/"},{"key":"e_1_3_2_1_9_1","volume-title":"2006 27th IEEE International Real-Time Systems Symposium (RTSS\u201906)","author":"Baruah K","year":"2006","unstructured":"Sanjoy\u00a0 K Baruah . 2006 . Resource sharing in EDF-scheduled systems: A closer look . In 2006 27th IEEE International Real-Time Systems Symposium (RTSS\u201906) . IEEE, 379\u2013387. Sanjoy\u00a0K Baruah. 2006. Resource sharing in EDF-scheduled systems: A closer look. In 2006 27th IEEE International Real-Time Systems Symposium (RTSS\u201906). IEEE, 379\u2013387."},{"key":"e_1_3_2_1_10_1","volume-title":"ECRTS 2020-32nd Euromicro Conference on Real-Time Systems. 1\u201322","author":"Bellec Nicolas","year":"2020","unstructured":"Nicolas Bellec , Simon Rokicki , and Isabelle Puaut . 2020 . Attack detection through monitoring of timing deviations in embedded real-time systems . In ECRTS 2020-32nd Euromicro Conference on Real-Time Systems. 1\u201322 . Nicolas Bellec, Simon Rokicki, and Isabelle Puaut. 2020. Attack detection through monitoring of timing deviations in embedded real-time systems. In ECRTS 2020-32nd Euromicro Conference on Real-Time Systems. 1\u201322."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009383.1009838"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076783"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_14_1","unstructured":"B Brandenburg. 2013. SchedCAT: The schedulability test collection and toolkit.  B Brandenburg. 2013. SchedCAT: The schedulability test collection and toolkit."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Robert Buecs Pramod Lakshman Jan Weinstock Florian Walbroel R. Leupers and G. Ascheid. 2018. Fully Virtual Rapid ADAS Prototyping via a Joined Multi-domain Co-simulation Ecosystem. In VEHITS.  Robert Buecs Pramod Lakshman Jan Weinstock Florian Walbroel R. Leupers and G. Ascheid. 2018. Fully Virtual Rapid ADAS Prototyping via a Joined Multi-domain Co-simulation Ecosystem. In VEHITS.","DOI":"10.5220\/0006665900590069"},{"key":"e_1_3_2_1_16_1","volume-title":"Control-Flow Integrity: Precision, Security, and Performance. ACM Computing Survey","author":"Burow Nathan","year":"2017","unstructured":"Nathan Burow , Scott\u00a0 A. Carr , Joseph Nash , Per Larsen , Michael Franz , Stefan Brunthaler , and Mathias Payer . 2017. Control-Flow Integrity: Precision, Security, and Performance. ACM Computing Survey ( 2017 ). Nathan Burow, Scott\u00a0A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, and Mathias Payer. 2017. Control-Flow Integrity: Precision, Security, and Performance. ACM Computing Survey (2017)."},{"key":"e_1_3_2_1_17_1","volume-title":"IEEE Symposium on Security and Privacy (SP).","author":"Burow Nathan","year":"2019","unstructured":"Nathan Burow , Xinping Zhang , and Mathias Payer . 2019 . SoK: Shining light on shadow stacks . In IEEE Symposium on Security and Privacy (SP). Nathan Burow, Xinping Zhang, and Mathias Payer. 2019. SoK: Shining light on shadow stacks. In IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_18_1","volume-title":"USENIX Security Symposium.","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway , Damon McCoy , Brian Kantor , Danny Anderson , Hovav Shacham , 2011 . Comprehensive experimental analyses of automotive attack surfaces .. In USENIX Security Symposium. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, 2011. Comprehensive experimental analyses of automotive attack surfaces.. In USENIX Security Symposium."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00365326"},{"key":"e_1_3_2_1_20_1","volume-title":"A simulation model for vehicle braking systems fitted with ABS. SAE Transactions","author":"Day D","year":"2002","unstructured":"Terry\u00a0 D Day and Sydney\u00a0 G Roberts . 2002. A simulation model for vehicle braking systems fitted with ABS. SAE Transactions ( 2002 ), 821\u2013839. Terry\u00a0D Day and Sydney\u00a0G Roberts. 2002. A simulation model for vehicle braking systems fitted with ABS. SAE Transactions (2002), 821\u2013839."},{"key":"e_1_3_2_1_21_1","volume-title":"Contego: An Adaptive Framework for Integrating Security Tasks in Real-Time Systems. In 29th Euromicro Conference on Real-Time Systems (ECRTS","author":"Hasan Monowar","year":"2017","unstructured":"Monowar Hasan , Sibin Mohan , Rodolfo Pellizzoni , and Rakesh\u00a0 B Bobba . 2017 . Contego: An Adaptive Framework for Integrating Security Tasks in Real-Time Systems. In 29th Euromicro Conference on Real-Time Systems (ECRTS 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni, and Rakesh\u00a0B Bobba. 2017. Contego: An Adaptive Framework for Integrating Security Tasks in Real-Time Systems. In 29th Euromicro Conference on Real-Time Systems (ECRTS 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_22_1","volume-title":"IEEE Symposium on Security and Privacy (SP).","author":"Hu Hong","year":"2016","unstructured":"Hong Hu , Shweta Shinde , Sendroiu Adrian , Zheng\u00a0Leong Chua , Prateek Saxena , and Zhenkai Liang . 2016 . Data-oriented programming: On the expressiveness of non-control data attacks . In IEEE Symposium on Security and Privacy (SP). Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng\u00a0Leong Chua, Prateek Saxena, and Zhenkai Liang. 2016. Data-oriented programming: On the expressiveness of non-control data attacks. In IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_23_1","unstructured":"Intel. 2020. Control-flow Enforcement Technology Specification. https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flow-enforcement-technology-preview.pdf  Intel. 2020. Control-flow Enforcement Technology Specification. https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flow-enforcement-technology-preview.pdf"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Marine Kadar Gerhard Fohler Don Kuzhiyelil and Philipp Gorski. 2021. Safety-Aware Integration of Hardware-Assisted Program Tracing in Mixed-Criticality Systems for Security Monitoring. In 2021 IEEE 27th Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE 292\u2013305.  Marine Kadar Gerhard Fohler Don Kuzhiyelil and Philipp Gorski. 2021. Safety-Aware Integration of Hardware-Assisted Program Tracing in Mixed-Criticality Systems for Security Monitoring. In 2021 IEEE 27th Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE 292\u2013305.","DOI":"10.1109\/RTAS52030.2021.00031"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Christoph\u00a0M Kirsch and Ana Sokolova. 2012. The logical execution time paradigm. In Advances in Real-Time Systems.  Christoph\u00a0M Kirsch and Ana Sokolova. 2012. The logical execution time paradigm. In Advances in Real-Time Systems.","DOI":"10.1007\/978-3-642-24349-3_5"},{"key":"e_1_3_2_1_26_1","volume-title":"2020 IEEE Symposium on Security and Privacy (SP). IEEE, 39\u201353","author":"Koruyeh Esmaeil\u00a0Mohammadian","year":"2020","unstructured":"Esmaeil\u00a0Mohammadian Koruyeh , Shirin Haji\u00a0Amin Shirazi , Khaled\u00a0 N Khasawneh , Chengyu Song , and Nael Abu-Ghazaleh . 2020 . Speccfi: Mitigating spectre attacks using cfi informed speculation . In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 39\u201353 . Esmaeil\u00a0Mohammadian Koruyeh, Shirin Haji\u00a0Amin Shirazi, Khaled\u00a0N Khasawneh, Chengyu Song, and Nael Abu-Ghazaleh. 2020. Speccfi: Mitigating spectre attacks using cfi informed speculation. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 39\u201353."},{"key":"e_1_3_2_1_27_1","unstructured":"Sreenath Krishnadas. 2016. Concept and Implementation of AUTOSAR compliant Automotive Ethernet stack on Infineon Aurix Tricore board. Master\u2019s thesis. Technische Universit\u00e4t Chemnitz.  Sreenath Krishnadas. 2016. Concept and Implementation of AUTOSAR compliant Automotive Ethernet stack on Infineon Aurix Tricore board. Master\u2019s thesis. Technische Universit\u00e4t Chemnitz."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_2_1_29_1","volume-title":"European Symposium on Research in Computer Security. Springer, 338\u2013358","author":"Li Jinfeng","year":"2020","unstructured":"Jinfeng Li , Liwei Chen , Qizhen Xu , Linan Tian , Gang Shi , Kai Chen , and Dan Meng . 2020 . Zipper stack: Shadow stacks without shadow . In European Symposium on Research in Computer Security. Springer, 338\u2013358 . Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, and Dan Meng. 2020. Zipper stack: Shadow stacks without shadow. In European Symposium on Research in Computer Security. Springer, 338\u2013358."},{"key":"e_1_3_2_1_30_1","unstructured":"Microsoft. 2022. Control Flow Guard - Win32 apps. https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/secbp\/control-flow-guard  Microsoft. 2022. Control Flow Guard - Win32 apps. https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/secbp\/control-flow-guard"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 28th International Conference on Real-Time Networks and Systems.","author":"Mishra Tanmaya","year":"2020","unstructured":"Tanmaya Mishra , Thidapat Chantem , and Ryan Gerdes . 2020 . TEECheck: Securing Intra-Vehicular Communication Using Trusted Execution . In Proceedings of the 28th International Conference on Real-Time Networks and Systems. Tanmaya Mishra, Thidapat Chantem, and Ryan Gerdes. 2020. TEECheck: Securing Intra-Vehicular Communication Using Trusted Execution. In Proceedings of the 28th International Conference on Real-Time Networks and Systems."},{"key":"e_1_3_2_1_32_1","volume-title":"Survey of Control-Flow Integrity Techniques for Real-Time Embedded Systems. ACM Transactions on Embedded Computing Systems (TECS)","author":"Mishra Tanmaya","year":"2022","unstructured":"Tanmaya Mishra , Thidapat Chantem , and Ryan Gerdes . 2022. Survey of Control-Flow Integrity Techniques for Real-Time Embedded Systems. ACM Transactions on Embedded Computing Systems (TECS) ( 2022 ). Tanmaya Mishra, Thidapat Chantem, and Ryan Gerdes. 2022. Survey of Control-Flow Integrity Techniques for Real-Time Embedded Systems. ACM Transactions on Embedded Computing Systems (TECS) (2022)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3356401.3356419"},{"key":"e_1_3_2_1_34_1","volume-title":"International Symposium on Research in Attacks, Intrusions, and Defenses.","author":"Nyman Thomas","year":"2017","unstructured":"Thomas Nyman , Jan-Erik Ekberg , Lucas Davi , and N Asokan . 2017 . CFI CaRE: Hardware-supported call and return enforcement for commercial microcontrollers . In International Symposium on Research in Attacks, Intrusions, and Defenses. Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, and N Asokan. 2017. CFI CaRE: Hardware-supported call and return enforcement for commercial microcontrollers. In International Symposium on Research in Attacks, Intrusions, and Defenses."},{"key":"e_1_3_2_1_35_1","volume-title":"IEEE Symposium on Security and Privacy.","author":"Schuster Felix","year":"2015","unstructured":"Felix Schuster , Thomas Tendyck , Christopher Liebchen , Lucas Davi , Ahmad-Reza Sadeghi , and Thorsten Holz . 2015 . Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications . In IEEE Symposium on Security and Privacy. Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, and Thorsten Holz. 2015. Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_36_1","volume-title":"PAC-PL: Enabling Control-Flow Integrity with Pointer Authentication in FPGA SoC Platforms. In 2022 IEEE 28th Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE, 241\u2013253","author":"Serra Gabriele","year":"2022","unstructured":"Gabriele Serra , Pietro Fara , Giorgiomaria Cicero , Francesco Restuccia , and Alessandro Biondi . 2022 . PAC-PL: Enabling Control-Flow Integrity with Pointer Authentication in FPGA SoC Platforms. In 2022 IEEE 28th Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE, 241\u2013253 . Gabriele Serra, Pietro Fara, Giorgiomaria Cicero, Francesco Restuccia, and Alessandro Biondi. 2022. PAC-PL: Enabling Control-Flow Integrity with Pointer Authentication in FPGA SoC Platforms. In 2022 IEEE 28th Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE, 241\u2013253."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_1_39_1","volume-title":"31st Euromicro Conference on Real-Time Systems (ECRTS","author":"Walls J","year":"2019","unstructured":"Robert\u00a0 J Walls , Nicholas\u00a0 F Brown , Thomas Le\u00a0Baron , Craig\u00a0 A Shue , Hamed Okhravi , and Bryan\u00a0 C Ward . 2019 . Control-flow integrity for real-time embedded systems . In 31st Euromicro Conference on Real-Time Systems (ECRTS 2019). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Robert\u00a0J Walls, Nicholas\u00a0F Brown, Thomas Le\u00a0Baron, Craig\u00a0A Shue, Hamed Okhravi, and Bryan\u00a0C Ward. 2019. Control-flow integrity for real-time embedded systems. In 31st Euromicro Conference on Real-Time Systems (ECRTS 2019). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Joseph Yiu. 2009. The definitive guide to the ARM Cortex-M3. Newnes.  Joseph Yiu. 2009. The definitive guide to the ARM Cortex-M3. Newnes.","DOI":"10.1016\/B978-1-85617-963-8.00017-X"},{"key":"e_1_3_2_1_41_1","volume-title":"ARMv8-M architecture technical overview. ARM WHITE PAPER","author":"Yiu Joseph","year":"2015","unstructured":"Joseph Yiu . 2015. ARMv8-M architecture technical overview. ARM WHITE PAPER ( 2015 ). Joseph Yiu. 2015. ARMv8-M architecture technical overview. ARM WHITE PAPER (2015)."},{"volume-title":"22nd { USENIX} Security Symposium ({ USENIX} Security 13). 337\u2013352.","author":"Zhang Mingwei","key":"e_1_3_2_1_42_1","unstructured":"Mingwei Zhang and R Sekar . 2013. Control flow integrity for { COTS} binaries . In 22nd { USENIX} Security Symposium ({ USENIX} Security 13). 337\u2013352. Mingwei Zhang and R Sekar. 2013. Control flow integrity for { COTS} binaries. In 22nd { USENIX} Security Symposium ({ USENIX} Security 13). 337\u2013352."},{"key":"e_1_3_2_1_43_1","volume-title":"Silhouette: Efficient Protected Shadow Stacks for Embedded Systems. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Zhou Jie","year":"2020","unstructured":"Jie Zhou , Yufei Du , Zhuojia Shen , Lele Ma , John Criswell , and Robert\u00a0 J. Walls . 2020 . Silhouette: Efficient Protected Shadow Stacks for Embedded Systems. In 29th USENIX Security Symposium (USENIX Security 20) . Jie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, and Robert\u00a0J. Walls. 2020. Silhouette: Efficient Protected Shadow Stacks for Embedded Systems. In 29th USENIX Security Symposium (USENIX Security 20)."}],"event":{"name":"RTNS 2023: The 31st International Conference on Real-Time Networks and Systems","acronym":"RTNS 2023","location":"Dortmund Germany"},"container-title":["The 31st International Conference on Real-Time Networks and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3575757.3575762","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:20Z","timestamp":1750182680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3575757.3575762"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,7]]},"references-count":43,"alternative-id":["10.1145\/3575757.3575762","10.1145\/3575757"],"URL":"https:\/\/doi.org\/10.1145\/3575757.3575762","relation":{},"subject":[],"published":{"date-parts":[[2023,6,7]]},"assertion":[{"value":"2023-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}