{"id":"https://openalex.org/W2893646423","doi":"https://doi.org/10.1109/iciot.2018.00027","title":"Towards an Inherently Secure Run-Time Environment for Medical Devices","display_name":"Towards an Inherently Secure Run-Time Environment for Medical Devices","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2893646423","doi":"https://doi.org/10.1109/iciot.2018.00027","mag":"2893646423"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iciot.2018.00027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020572873","display_name":"Cyril Bresch","orcid":"https://orcid.org/0000-0003-3027-0151"},"institutions":[{"id":"https://openalex.org/I106785703","display_name":"Institut polytechnique de Grenoble","ror":"https://ror.org/05sbt2524","country_code":"FR","type":"education","lineage":["https://openalex.org/I106785703","https://openalex.org/I899635006"]},{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Cyril Bresch","raw_affiliation_strings":["Grenoble INp, LeIS, Univ. Grenoble Alpes, Valence, France"],"affiliations":[{"raw_affiliation_string":"Grenoble INp, LeIS, Univ. Grenoble Alpes, Valence, France","institution_ids":["https://openalex.org/I106785703","https://openalex.org/I899635006"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106458094","display_name":"St\u00e9phanie Chollet","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145979","display_name":"Laboratoire de Conception et d'Int\u00e9gration des Syst\u00e8mes","ror":"https://ror.org/04eg25g76","country_code":"FR","type":"facility","lineage":["https://openalex.org/I106785703","https://openalex.org/I4210145979","https://openalex.org/I899635006"]},{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Stephanie Chollet","raw_affiliation_strings":["LCIS, Univ. Grenoble Alpes, Valence, France"],"affiliations":[{"raw_affiliation_string":"LCIS, Univ. Grenoble Alpes, Valence, France","institution_ids":["https://openalex.org/I4210145979","https://openalex.org/I899635006"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060495895","display_name":"David H\u00e9ly","orcid":"https://orcid.org/0000-0003-3249-7667"},"institutions":[{"id":"https://openalex.org/I4210145979","display_name":"Laboratoire de Conception et d'Int\u00e9gration des Syst\u00e8mes","ror":"https://ror.org/04eg25g76","country_code":"FR","type":"facility","lineage":["https://openalex.org/I106785703","https://openalex.org/I4210145979","https://openalex.org/I899635006"]},{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"David Hely","raw_affiliation_strings":["LCIS, Univ. Grenoble Alpes, Valence, France"],"affiliations":[{"raw_affiliation_string":"LCIS, Univ. Grenoble Alpes, Valence, France","institution_ids":["https://openalex.org/I4210145979","https://openalex.org/I899635006"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":5,"citation_normalized_percentile":{"value":0.668966,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":79,"max":80},"biblio":{"volume":null,"issue":null,"first_page":"140","last_page":"147"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13248","display_name":"Healthcare Technology and Patient Monitoring","score":0.9887,"subfield":{"id":"https://openalex.org/subfields/2746","display_name":"Surgery"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9822,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.61800784},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.60147446},{"id":"https://openalex.org/keywords/control-flow-graph","display_name":"Control flow graph","score":0.50401896},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.41529292}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.745391},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6352514},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.61800784},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.60147446},{"id":"https://openalex.org/C27458966","wikidata":"https://www.wikidata.org/wiki/Q1187693","display_name":"Control flow graph","level":2,"score":0.50401896},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4376827},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4172877},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.41529292},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33189115},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iciot.2018.00027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://hal.science/hal-01898660","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":["Centre National de la Recherche Scientifique"],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://hal.archives-ouvertes.fr/hal-01898660","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":["Centre National de la Recherche Scientifique"],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/1","display_name":"No poverty","score":0.66}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":20,"referenced_works":["https://openalex.org/W1575709006","https://openalex.org/W2004456327","https://openalex.org/W2036329595","https://openalex.org/W2075095478","https://openalex.org/W2081768685","https://openalex.org/W2090181646","https://openalex.org/W2117798902","https://openalex.org/W2135274013","https://openalex.org/W2160725972","https://openalex.org/W2290803433","https://openalex.org/W2295234910","https://openalex.org/W2301548261","https://openalex.org/W2463516579","https://openalex.org/W2472333518","https://openalex.org/W2512784977","https://openalex.org/W2625587722","https://openalex.org/W2668120530","https://openalex.org/W2752493903","https://openalex.org/W3103497171","https://openalex.org/W4242383889"],"related_works":["https://openalex.org/W4210453401","https://openalex.org/W2998775986","https://openalex.org/W2573637329","https://openalex.org/W2166895275","https://openalex.org/W2150418816","https://openalex.org/W2138385884","https://openalex.org/W2080313875","https://openalex.org/W2011536294","https://openalex.org/W1724049288","https://openalex.org/W157564837"],"abstract_inverted_index":{"Connected":[0],"medical":[1,6,51,92],"devices":[2,10,61,93],"are":[3,11],"promising":[4],"in":[5,16],"area.":[7],"However,":[8],"these":[9],"known":[12],"to":[13,21,48,90],"be":[14],"poor":[15],"security":[17],"and":[18,53,62,86],"strongly":[19],"vulnerable":[20],"code":[22],"injection":[23],"attacks.":[24,73],"These":[25],"attacks":[26],"aim":[27],"at":[28],"modifying":[29],"the":[30,67,79,84,87],"run-time":[31,72],"behavior":[32],"of":[33,66,78],"an":[34,64],"application":[35,52],"by":[36],"violating":[37],"its":[38],"control":[39,50],"flow":[40,43],"graph.":[41],"Control":[42],"hijacking":[44],"can":[45],"lead":[46],"hackers":[47],"remotely":[49],"endanger":[54],"patient's":[55],"life.":[56],"This":[57],"article":[58],"focuses":[59],"on":[60],"provides":[63],"overview":[65],"different":[68],"countermeasures":[69],"that":[70],"mitigate":[71],"Finally,":[74],"from":[75],"this":[76],"state":[77],"art,":[80],"we":[81],"will":[82],"expose":[83],"perspectives":[85],"ongoing":[88],"work":[89],"make":[91],"inherently":[94],"more":[95],"secure.":[96]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2893646423","counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-01-23T01:39:27.211836","created_date":"2018-10-05"}