{"id":"https://openalex.org/W4399817439","doi":"https://doi.org/10.1145/3672460","title":"Bitmap-Based Security Monitoring for Deeply Embedded Systems","display_name":"Bitmap-Based Security Monitoring for Deeply Embedded Systems","publication_year":2024,"publication_date":"2024-06-19","ids":{"openalex":"https://openalex.org/W4399817439","doi":"https://doi.org/10.1145/3672460"},"language":"en","primary_location":{"id":"doi:10.1145/3672460","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3672460","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3672460","source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3672460","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052907459","display_name":"Anni Peng","orcid":"https://orcid.org/0000-0003-4311-9434"},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Anni Peng","raw_affiliation_strings":["National Computer Network Intrusion Protection Center, UCAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, UCAS, Beijing, China","institution_ids":["https://openalex.org/I4210108629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071831111","display_name":"Dongliang Fang","orcid":"https://orcid.org/0009-0005-7484-1333"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongliang Fang","raw_affiliation_strings":["Institute of Information Engineering, CAS, UCAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, CAS, UCAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057991555","display_name":"Le Guan","orcid":"https://orcid.org/0000-0002-8205-5616"},"institutions":[{"id":"https://openalex.org/I165733156","display_name":"University of Georgia","ror":"https://ror.org/00te3t702","country_code":"US","type":"education","lineage":["https://openalex.org/I165733156"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Le Guan","raw_affiliation_strings":["University of Georgia, Athens, GA, USA"],"affiliations":[{"raw_affiliation_string":"University of Georgia, Athens, GA, USA","institution_ids":["https://openalex.org/I165733156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084448782","display_name":"Erik van der Kouwe","orcid":"https://orcid.org/0000-0002-0312-9913"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Erik van der Kouwe","raw_affiliation_strings":["Vrije Universiteit Amsterdam, Amsterdam, Netherland"],"affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Amsterdam, Netherland","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041977254","display_name":"Yin Li","orcid":"https://orcid.org/0000-0002-0085-6429"},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yin Li","raw_affiliation_strings":["National Computer Network Intrusion Protection Center, UCAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, UCAS, Beijing, China","institution_ids":["https://openalex.org/I4210108629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100768918","display_name":"Wenwen Wang","orcid":"https://orcid.org/0000-0003-0840-4846"},"institutions":[{"id":"https://openalex.org/I165733156","display_name":"University of Georgia","ror":"https://ror.org/00te3t702","country_code":"US","type":"education","lineage":["https://openalex.org/I165733156"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenwen Wang","raw_affiliation_strings":["University of Georgia, Athens, GA, USA"],"affiliations":[{"raw_affiliation_string":"University of Georgia, Athens, GA, USA","institution_ids":["https://openalex.org/I165733156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061643975","display_name":"Limin Sun","orcid":"https://orcid.org/0000-0003-2745-7521"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Limin Sun","raw_affiliation_strings":["Institute of Information Engineering, CAS, UCAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, CAS, UCAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100401884","display_name":"Yuqing Zhang","orcid":"https://orcid.org/0000-0001-8306-7195"},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqing Zhang","raw_affiliation_strings":["National Computer Network Intrusion Protection Center, UCAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, UCAS, Beijing, China","institution_ids":["https://openalex.org/I4210108629"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5052907459"],"corresponding_institution_ids":["https://openalex.org/I4210108629"],"apc_list":null,"apc_paid":null,"fwci":0.3662,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.64304575,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"33","issue":"7","first_page":"1","last_page":"31"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8289992809295654},{"id":"https://openalex.org/keywords/bitmap","display_name":"Bitmap","score":0.7489410638809204},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4032214283943176},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38401007652282715},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3515058159828186},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.33291736245155334},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.14648371934890747}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8289992809295654},{"id":"https://openalex.org/C3115412","wikidata":"https://www.wikidata.org/wiki/Q1194708","display_name":"Bitmap","level":2,"score":0.7489410638809204},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4032214283943176},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38401007652282715},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3515058159828186},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.33291736245155334},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.14648371934890747}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3672460","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3672460","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3672460","source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"},{"id":"pmh:oai:research.vu.nl:openaire/eae31ca5-ea74-4464-806d-71b937e3cee9","is_oa":true,"landing_page_url":"https://research.vu.nl/en/publications/eae31ca5-ea74-4464-806d-71b937e3cee9","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peng, A, Fang, D, Guan, L, van der Kouwe, E, Li, Y, Wang, W, Sun, L & Zhang, Y 2024, 'Bitmap-Based Security Monitoring for Deeply Embedded Systems', ACM Transactions on Software Engineering and Methodology, vol. 33, no. 7, 192. https://doi.org/10.1145/3672460","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:research.vu.nl:openaire_cris_publications/eae31ca5-ea74-4464-806d-71b937e3cee9","is_oa":true,"landing_page_url":"https://hdl.handle.net/1871.1/eae31ca5-ea74-4464-806d-71b937e3cee9","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Peng, A, Fang, D, Guan, L, van der Kouwe, E, Li, Y, Wang, W, Sun, L & Zhang, Y 2024, 'Bitmap-Based Security Monitoring for Deeply Embedded Systems', ACM Transactions on Software Engineering and Methodology, vol. 33, no. 7, 192. https://doi.org/10.1145/3672460","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1145/3672460","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3672460","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3672460","source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2061340588","display_name":null,"funder_award_id":"U2336203 and U1836210","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4399817439.pdf"},"referenced_works_count":45,"referenced_works":["https://openalex.org/W1981737703","https://openalex.org/W1993682390","https://openalex.org/W1995264769","https://openalex.org/W2002278866","https://openalex.org/W2042856445","https://openalex.org/W2066129764","https://openalex.org/W2080313875","https://openalex.org/W2081768685","https://openalex.org/W2086839628","https://openalex.org/W2088383546","https://openalex.org/W2117798902","https://openalex.org/W2121579803","https://openalex.org/W2123845384","https://openalex.org/W2128171167","https://openalex.org/W2133592286","https://openalex.org/W2138517425","https://openalex.org/W2159059513","https://openalex.org/W2258876169","https://openalex.org/W2346595863","https://openalex.org/W2512784977","https://openalex.org/W2517176850","https://openalex.org/W2561791320","https://openalex.org/W2597705742","https://openalex.org/W2613412685","https://openalex.org/W2625587722","https://openalex.org/W2686848947","https://openalex.org/W2686866989","https://openalex.org/W2726959541","https://openalex.org/W2751343396","https://openalex.org/W2752493903","https://openalex.org/W2863858990","https://openalex.org/W2891216228","https://openalex.org/W2896993707","https://openalex.org/W2969920946","https://openalex.org/W3005046538","https://openalex.org/W3008498533","https://openalex.org/W3015593455","https://openalex.org/W3108497723","https://openalex.org/W3156978076","https://openalex.org/W3170523536","https://openalex.org/W3192615057","https://openalex.org/W3212146520","https://openalex.org/W4220866604","https://openalex.org/W4246166885","https://openalex.org/W4285728596"],"related_works":["https://openalex.org/W2350456333","https://openalex.org/W2101993108","https://openalex.org/W2356608866","https://openalex.org/W2355840328","https://openalex.org/W1975966184","https://openalex.org/W2137246017","https://openalex.org/W2364393392","https://openalex.org/W3126935378","https://openalex.org/W2377096008","https://openalex.org/W2809136181"],"abstract_inverted_index":{"Deeply":[0],"embedded":[1],"systems":[2],"powered":[3],"by":[4],"microcontrollers":[5],"are":[6,25,102],"becoming":[7],"popular":[8],"with":[9],"the":[10,85,88,108,116,119,167],"emergence":[11],"of":[12,64,87,107,110,187],"Internet-of-Things":[13],"(IoT)":[14],"technology.":[15],"However,":[16],"these":[17],"devices":[18],"primarily":[19],"run":[20],"C/C":[21],"\\({+}{+}\\)":[22],"code":[23],"and":[24,39,54,96,104,125,137,170,182,192],"susceptible":[26],"to":[27,34,83,121,133],"memory":[28,100,163,194],"bugs,":[29],"which":[30],"can":[31],"potentially":[32],"lead":[33],"both":[35,93],"control":[36,94],"data":[37,41,90,95],"attacks":[38],"non-control":[40,97],"attacks.":[42],"Existing":[43],"defense":[44,112],"mechanisms":[45],"(such":[46],"as":[47],"control-flow":[48],"integrity":[49,52,56,124],"(CFI),":[50],"dataflow":[51],"(DFI)":[53],"write":[55],"testing":[57],"(WIT),":[58],"etc.)":[59],"consume":[60],"a":[61,79,159,185],"massive":[62],"amount":[63],"resources,":[65],"making":[66],"them":[67],"less":[68],"practical":[69],"in":[70,118,162],"real":[71],"products.":[72],"To":[73],"make":[74,138],"it":[75,142],"lightweight,":[76],"we":[77,128],"design":[78],"bitmap-based":[80],"allowlist":[81,117],"mechanism":[82],"unify":[84],"storage":[86],"runtime":[89,175],"for":[91],"protecting":[92],"data.":[98],"The":[99],"requirements":[101],"constant":[103],"small,":[105],"regardless":[106],"number":[109],"deployed":[111],"mechanisms.":[113],"We":[114,144],"store":[115],"TrustZone":[120],"ensure":[122],"its":[123],"confidentiality.":[126],"Meanwhile,":[127],"perform":[129],"an":[130,150],"offline":[131],"analysis":[132],"detect":[134],"potential":[135],"collisions":[136],"corresponding":[139],"adjustments":[140],"when":[141,165],"happens.":[143],"have":[145],"implemented":[146],"our":[147,178],"idea":[148],"on":[149,196],"ARM":[151],"Cortex-M-based":[152],"development":[153],"board.":[154],"Our":[155],"evaluation":[156],"results":[157],"show":[158],"substantial":[160],"reduction":[161],"consumption":[164],"deploying":[166],"proposed":[168],"CFI":[169,181],"DFI":[171,183],"mechanisms,":[172],"without":[173],"compromising":[174],"performance.":[176],"Specifically,":[177],"prototype":[179],"enforces":[180],"at":[184],"cost":[186],"just":[188],"2.09%":[189],"performance":[190],"overhead":[191,195],"32.56%":[193],"average.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
