{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:50:38Z","timestamp":1730213438521,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/dasc-picom-datacom-cyberscitec.2017.88","type":"proceedings-article","created":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T20:43:24Z","timestamp":1522701804000},"page":"454-461","source":"Crossref","is-referenced-by-count":1,"title":["Securing Real-Time Cyber-Physical Systems Using WCET-Aware Artificial Diversity"],"prefix":"10.1109","author":[{"given":"Joachim","family":"Fellmuth","sequence":"first","affiliation":[]},{"given":"Paula","family":"Herber","sequence":"additional","affiliation":[]},{"given":"Tobias F.","family":"Pfeffer","sequence":"additional","affiliation":[]},{"given":"Sabine","family":"Glesner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-3-642-10772-6_13","article-title":"Drop: Detecting return-oriented programming malicious code","author":"chen","year":"2009","journal-title":"International Conference on Information Systems Security"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900550"},{"key":"ref36","article-title":"WCET-Aware Partial Control-Flow Checking for Resource-Constrained Real-Time Embedded Systems","author":"gu","year":"2014","journal-title":"Industrial Electronics"},{"key":"ref35","article-title":"Binary rewriting without relocation information","author":"smithson","year":"2010","journal-title":"University of Maryland Tech Rep"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"ref11","article-title":"Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software","author":"kil","year":"2006","journal-title":"ACSAC"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2013.6494997"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"ref15","first-page":"552","article-title":"The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)","author":"shacham","year":"2007","journal-title":"Conference on Computer and Communications Security"},{"journal-title":"PaX address space layout randomization (ASLR)","year":"2003","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998434"},{"key":"ref18","article-title":"Breaking down mirai: An iot ddos botnet analysis","author":"zeifman","year":"2016","journal-title":"Imperva"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484351"},{"key":"ref28","article-title":"Stackghost: Hardware facilitated stack protection","volume":"112","author":"frantzen","year":"2001","journal-title":"USENIX Security Symposium"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455775"},{"key":"ref29","first-page":"161","article-title":"Control-flow bending: On the effectiveness of control-flow integrity","author":"carlini","year":"2015","journal-title":"USENIX Security Symposium"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"ref8","article-title":"Embedded market study","author":"tech","year":"2014","journal-title":"Embedded Systems Design"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"ref2","first-page":"30","article-title":"Jump-oriented programming: A new class of code-reuse attack","author":"bletsch","year":"2011","journal-title":"Symposium on Information Computer and Communications Security"},{"key":"ref9","article-title":"Remote exploitation of an unaltered passenger vehicle","author":"miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.52"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-642-16256-5_6","article-title":"OTAWA: An Open Toolbox for Adaptive WCET Analysis","author":"ballabriga","year":"2010","journal-title":"Software Technologies for Embedded and Ubiquitous Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1347375.1347389"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2392987.2393000"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2584654"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CPSNA.2013.6614242"},{"key":"ref25","first-page":"137","author":"gustafsson","year":"2010","journal-title":"The Ma?lardalen WCET Benchmarks - Past Present and Future"}],"event":{"name":"2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech)","start":{"date-parts":[[2017,11,6]]},"location":"Orlando, FL","end":{"date-parts":[[2017,11,10]]}},"container-title":["2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8327304\/8328301\/08328432.pdf?arnumber=8328432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T05:37:03Z","timestamp":1643175423000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8328432\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/dasc-picom-datacom-cyberscitec.2017.88","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}