{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:10Z","timestamp":1750220050701,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1145\/3586102.3586112","type":"proceedings-article","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T04:57:37Z","timestamp":1690261057000},"page":"64-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2986-0368","authenticated-orcid":false,"given":"Jin","family":"Zhou","sequence":"first","affiliation":[{"name":"faculty of Information Technology, Beijing University Of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9812-1609","authenticated-orcid":false,"given":"Zhenhu","family":"Ning","sequence":"additional","affiliation":[{"name":"faculty of Information Technology, Beijing University Of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8516-6945","authenticated-orcid":false,"given":"Qi","family":"Wang","sequence":"additional","affiliation":[{"name":"Trusted Computing Technology Co.LTD Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5310-581X","authenticated-orcid":false,"given":"Yuchen","family":"Wang","sequence":"additional","affiliation":[{"name":"faculty of Information Technology, Beijing University Of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Corteggiani Nassim","year":"2018","unstructured":"Corteggiani , Nassim , Giovanni Camurati , and Aur\u00e9lien Francillon . \"Inception:{System-Wide} Security Testing of {Real-World} Embedded Systems Software .\" 27th USENIX Security Symposium (USENIX Security 18) . 2018 . Corteggiani, Nassim, Giovanni Camurati, and Aur\u00e9lien Francillon. \"Inception:{System-Wide} Security Testing of {Real-World} Embedded Systems Software.\" 27th USENIX Security Symposium (USENIX Security 18). 2018."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/358669.358692"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3047976"},{"volume-title":"Proceedings of the first USENIX workshop on Offensive Technologies (WOOT \u201907)","author":"Liu Wei","key":"e_1_3_2_1_4_1","unstructured":"Liu , Wei , \"Research on technology of embedded system security protection component.\" 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA). IEEE, 2020. Matthew Van Gundy , Davide Balzarotti , and Giovanni Vigna . 2007. Catch me, if you can: Evading network signatures with web-based polymorphic worms . In Proceedings of the first USENIX workshop on Offensive Technologies (WOOT \u201907) . USENIX Association , Berkley, CA , Article 7, 9 pages. Liu, Wei, \"Research on technology of embedded system security protection component.\" 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA). IEEE, 2020.Matthew Van Gundy, Davide Balzarotti, and Giovanni Vigna. 2007. Catch me, if you can: Evading network signatures with web-based polymorphic worms. In Proceedings of the first USENIX workshop on Offensive Technologies (WOOT \u201907) . USENIX Association, Berkley, CA, Article 7, 9 pages."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-09237-4"},{"key":"e_1_3_2_1_6_1","volume-title":"Communication & Networking Technologies (ICRTCCNT).","author":"Rajendran Gowthamaraj","year":"2019","unstructured":"Rajendran , Gowthamaraj , and Ragul Nivash . \"Security in the Embedded System : Attacks and Countermeasures.\" Proceedings of International Conference on Recent Trends in Computing , Communication & Networking Technologies (ICRTCCNT). 2019 .Prokop, Emily. 2018. The Story Behind. Mango Publishing Group . Florida, USA. Rajendran, Gowthamaraj, and Ragul Nivash. \"Security in the Embedded System: Attacks and Countermeasures.\" Proceedings of International Conference on Recent Trends in Computing, Communication & Networking Technologies (ICRTCCNT). 2019.Prokop, Emily. 2018. The Story Behind. Mango Publishing Group. Florida, USA."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/567446.567449"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Vankeirsbilck Jens Hans Hallez and Jeroen Boydens. \"Automatic implementation of control flow error detection techniques.\" Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control. 2019.  Vankeirsbilck Jens Hans Hallez and Jeroen Boydens. \"Automatic implementation of control flow error detection techniques.\" Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control. 2019.","DOI":"10.1145\/3386164.3389106"},{"issue":"1","key":"e_1_3_2_1_9_1","first-page":"133","article-title":"Research on Stack Protection Technology Based on GCC Plugin","volume":"35","author":"Meng","year":"2018","unstructured":"Ya-gang, W. A. N. G., C. A. O. Yao-bin, and W. A. N. G. Meng . \" Research on Stack Protection Technology Based on GCC Plugin .\" Microelectronics & Computer 35 . 1 ( 2018 ): 133 - 136 . Ya-gang, W. A. N. G., C. A. O. Yao-bin, and W. A. N. G. Meng. \"Research on Stack Protection Technology Based on GCC Plugin.\" Microelectronics & Computer 35.1 (2018): 133-136.","journal-title":"Microelectronics & Computer"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847733"},{"key":"e_1_3_2_1_11_1","first-page":"3","article-title":"Framework design of embedded security operating system based on uC\/OS-II","volume":"15","author":"Yuehua Zhao","year":"2006","unstructured":"Yuehua , Zhao ,et al. \" Framework design of embedded security operating system based on uC\/OS-II .\" Computer Engineering and Design 27 . 15 ( 2006 ): 3 . Yuehua, Zhao,et al. \" Framework design of embedded security operating system based on uC\/OS-II.\" Computer Engineering and Design 27.15(2006):3.","journal-title":"Computer Engineering and Design 27"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101922"}],"event":{"name":"ICCNS 2022: 2022 the 12th International Conference on Communication and Network Security","acronym":"ICCNS 2022","location":"Beijing China"},"container-title":["Proceedings of the 2022 12th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3586102.3586112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3586102.3586112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:11Z","timestamp":1750183691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3586102.3586112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":12,"alternative-id":["10.1145\/3586102.3586112","10.1145\/3586102"],"URL":"https:\/\/doi.org\/10.1145\/3586102.3586112","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"2023-07-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}