{"id":"https://openalex.org/W2911783262","doi":"https://doi.org/10.1109/desec.2018.8625140","title":"Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things","display_name":"Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2911783262","doi":"https://doi.org/10.1109/desec.2018.8625140","mag":"2911783262"},"language":"en","primary_location":{"id":"doi:10.1109/desec.2018.8625140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/desec.2018.8625140","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pureadmin.qub.ac.uk/ws/files/189013889/DSC2018.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024014781","display_name":"Matthew Hagan","orcid":"https://orcid.org/0000-0001-5395-843X"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Matthew Hagan","raw_affiliation_strings":["Centre for Secure Information Systems (CSIT), Queens University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Systems (CSIT), Queens University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085167798","display_name":"Fahad Siddiqui","orcid":"https://orcid.org/0000-0002-4334-9478"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Fahad Siddiqui","raw_affiliation_strings":["Centre for Secure Information Systems (CSIT), Queens University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Systems (CSIT), Queens University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103020013","display_name":"Sakir Sezer","orcid":"https://orcid.org/0000-0003-2857-616X"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sakir Sezer","raw_affiliation_strings":["Centre for Secure Information Systems (CSIT), Queens University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Systems (CSIT), Queens University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007577685","display_name":"BooJoong Kang","orcid":"https://orcid.org/0000-0001-5984-9867"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"BooJoong Kang","raw_affiliation_strings":["Centre for Secure Information Systems (CSIT), Queens University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Systems (CSIT), Queens University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027789250","display_name":"Kieran McLaughlin","orcid":"https://orcid.org/0000-0002-1299-2364"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Kieran McLaughlin","raw_affiliation_strings":["Centre for Secure Information Systems (CSIT), Queens University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Systems (CSIT), Queens University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5024014781"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":0.844,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.81289918,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.7070585489273071},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6968430876731873},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.653579831123352},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6204625964164734},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5743187665939331},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.5708760023117065},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5090693831443787},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.43742096424102783}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.7070585489273071},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6968430876731873},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.653579831123352},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6204625964164734},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5743187665939331},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.5708760023117065},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5090693831443787},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.43742096424102783},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/desec.2018.8625140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/desec.2018.8625140","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/265d6100-c715-4dc4-9dff-658f795a1772","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/265d6100-c715-4dc4-9dff-658f795a1772","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/189013889/DSC2018.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hagan, M, Siddiqui, F M, Sezer, S, Kang, B & McLaughlin, K 2019, Enforcing policy-based security models for embedded SoCs within the internet of things. in IEEE International Conference on Secure and Dependable Systems: Proceedings. Institute of Electrical and Electronics Engineers Inc., Kaohsiung, Taiwan, IEEE International Conference on Dependable and Secure Systems, Kaohsiung, Taiwan, 10/12/2018. https://doi.org/10.1109/DESEC.2018.8625140","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/265d6100-c715-4dc4-9dff-658f795a1772","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/265d6100-c715-4dc4-9dff-658f795a1772","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/189013889/DSC2018.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hagan, M, Siddiqui, F M, Sezer, S, Kang, B & McLaughlin, K 2019, Enforcing policy-based security models for embedded SoCs within the internet of things. in IEEE International Conference on Secure and Dependable Systems: Proceedings. Institute of Electrical and Electronics Engineers Inc., Kaohsiung, Taiwan, IEEE International Conference on Dependable and Secure Systems, Kaohsiung, Taiwan, 10/12/2018. https://doi.org/10.1109/DESEC.2018.8625140","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[{"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12","score":0.6000000238418579}],"awards":[{"id":"https://openalex.org/G2241406505","display_name":null,"funder_award_id":"EP/R007187/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6577499357","display_name":null,"funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2911783262.pdf","grobid_xml":"https://content.openalex.org/works/W2911783262.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W129397930","https://openalex.org/W981357659","https://openalex.org/W1604658196","https://openalex.org/W1983872353","https://openalex.org/W1985221117","https://openalex.org/W2084044852","https://openalex.org/W2121251946","https://openalex.org/W2130475833","https://openalex.org/W2235136707","https://openalex.org/W2294098343","https://openalex.org/W2475320399","https://openalex.org/W2555159923","https://openalex.org/W2694044524","https://openalex.org/W2736971608","https://openalex.org/W2748868501","https://openalex.org/W2753121243","https://openalex.org/W2767667498","https://openalex.org/W2795245562","https://openalex.org/W2901880105","https://openalex.org/W6679056614","https://openalex.org/W6743493502","https://openalex.org/W6756248763","https://openalex.org/W6812742317"],"related_works":["https://openalex.org/W3188635106","https://openalex.org/W4327925648","https://openalex.org/W2590902718","https://openalex.org/W2902515791","https://openalex.org/W2551252619","https://openalex.org/W1929087753","https://openalex.org/W4313480469","https://openalex.org/W2054653008","https://openalex.org/W4206289605","https://openalex.org/W2911783262"],"abstract_inverted_index":{"Within":[0],"complex":[1],"IoT":[2,50],"ecosystems":[3],"and":[4,17,23,69,118,131,222],"network":[5],"structures,":[6],"hard":[7],"to":[8,13,48,93,150,165,169,171,239],"find":[9],"vulnerabilities":[10],"have":[11,183],"potential":[12,84],"cause":[14],"significant":[15],"disruption":[16],"damage.":[18],"In":[19],"addition,":[20],"device":[21,61,104],"tampering":[22],"re-purposing":[24],"can":[25,53,81,113,136,189,214,227],"threaten":[26],"business":[27],"models":[28,135],"of":[29,36,59,71,196],"service":[30],"providers.":[31],"The":[32],"vulnerability":[33],"surface":[34],"area":[35],"the":[37,41,46,49,60,72,78,100,138,147,158,172,179,208,219,225,232,240],"ecosystem":[38],"ranges":[39],"across":[40],"entire":[42],"system":[43,241],"architecture,":[44],"from":[45],"cloud":[47],"device.":[51,73],"These":[52],"be":[54,114,163,228],"introduced":[55,229],"at":[56],"any":[57],"stage":[58],"life-cycle,":[62],"including":[63],"design,":[64],"programming,":[65],"manufacturing,":[66],"integration,":[67],"operation":[68],"maintenance":[70],"While":[74,211],"threat":[75,129,148,212],"modelling":[76,130,149,213],"during":[77],"design":[79,139,185,220,233],"phase":[80],"alleviate":[82],"some":[83],"vulnerabilities,":[85],"it":[86],"is":[87,107,201],"more":[88],"difficult":[89],"or":[90],"even":[91],"impossible":[92],"mitigate":[94],"problems":[95],"for":[96,193,217],"devices":[97],"already":[98],"in":[99],"market.":[101],"A":[102],"policy-based":[103],"security":[105,120,134,155,159,174],"model":[106],"proposed":[108],"as":[109,187,207],"an":[110,204],"approach,":[111],"that":[112,144],"enforced":[115],"using":[116,146,203],"hardware":[117],"software":[119],"architectures.":[121],"This":[122,141],"paper":[123],"reflects":[124],"on":[125,128,178],"existing":[126],"literature":[127],"how":[132],"derived":[133],"influence":[137],"phase.":[140],"contribution":[142],"proposes":[143],"by":[145],"define":[151],"specific":[152],"use":[153],"case":[154],"policies":[156],"within":[157],"model,":[160],"OEMs":[161],"will":[162,182],"able":[164],"tailor":[166],"their":[167],"solution":[168],"conform":[170],"user's":[173],"requirements.":[175],"Platform":[176],"vendors,":[177],"other":[180],"hand,":[181],"reduced":[184],"costs":[186],"they":[188],"offer":[190],"generic":[191],"solutions":[192],"differing":[194],"levels":[195],"criticality.":[197],"An":[198],"example":[199],"scenario":[200],"provided":[202],"industrial":[205],"PLC":[206],"attack":[209],"target.":[210],"establish":[215],"countermeasures":[216],"both":[218],"process":[221],"policy":[223,226],"defining,":[224],"quickly,":[230],"whereas":[231],"method":[234],"approach":[235],"requires":[236],"extensive":[237],"modification":[238],"firmware.":[242]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
