{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:32:03Z","timestamp":1730259123105,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/icssa.2017.16","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T20:32:27Z","timestamp":1529958747000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["On the Impact of Kernel Code Vulnerabilities in IoT Devices"],"prefix":"10.1109","author":[{"given":"Sebastian","family":"Eresheim","sequence":"first","affiliation":[]},{"given":"Robert","family":"Luh","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Schrittwieser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Windows Internals","year":"2012","author":"russinovich","key":"ref10"},{"key":"ref11","first-page":"17","article-title":"Vice-catch the hookers","volume":"61","author":"butler","year":"2004","journal-title":"Black Hat USA"},{"journal-title":"Rootkits Subverting the Windows Kernel","year":"2006","author":"hoglund","key":"ref12"},{"journal-title":"Driver signing changes in windows 10","year":"2015","author":"baxter","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-007-0045-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.116"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244070"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346269"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315262"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519072"},{"key":"ref4","first-page":"22","article-title":"The evolution of connected vehicle technology: From smart drivers to smart cars to &#x2026; self-driving cars","volume":"83","author":"narla","year":"2013","journal-title":"ITE J -Inst Transportation Engineers"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2014.09.046"},{"journal-title":"Gartner's 2016 Hype Cycle for Emerging Technologies","year":"2016","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/10630732.2011.601117"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"journal-title":"Mcaffee labs 2017 threats predictions","year":"2016","key":"ref7"},{"key":"ref2","first-page":"66","article-title":"A smart fridge with an ability to enhance health and enable better nutrition","volume":"4","author":"luo","year":"2009","journal-title":"Int J Multimedia Ubiquitous Eng"},{"journal-title":"Smart light bulb","year":"2003","author":"lys","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22915-7_40"},{"key":"ref20","first-page":"179","article-title":"Copilot-a coprocessor-based kernel runtime integrity monitor","author":"petroni","year":"2004","journal-title":"USENIX Security Symposium"},{"key":"ref22","article-title":"A survey of stealth malware: Attacks, mitigation measures, and steps toward autonomous open world solutions","author":"rudd","year":"2016","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232409"},{"key":"ref24","article-title":"An architecture for specification-based detection of semantic integrity violations in kernel dynamic data","author":"petroni","year":"0","journal-title":"Proc USENIX Security 2006"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.38"}],"event":{"name":"2017 International Conference on Software Security and Assurance (ICSSA)","start":{"date-parts":[[2017,7,24]]},"location":"Altoona, PA","end":{"date-parts":[[2017,7,25]]}},"container-title":["2017 International Conference on Software Security and Assurance (ICSSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8392483\/8392598\/08392609.pdf?arnumber=8392609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T09:10:26Z","timestamp":1643188226000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8392609\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icssa.2017.16","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}