SensorLoader: Bridging the Gap in Cyber-Physical Reverse Engineering Across Embedded Peripheral Devices Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.1145/3628356.3630117
Safety-critical cyber-physical systems, such as autonomous vehicles and medical devices, are often driven by notions of state provided by sensor information translated through embedded firmware. This sensor pipeline is often a fragmented supply chain across vendors, and analyzing the associated security properties entails semantic reverse engineering of third-party software, i.e., mapping low-level software representations to cyber-physical models without access to source code. This mapping is a manual, time-consuming, and error-prone process. This paper introduces SensorLoader, a tool designed to automate mapping sensor semantics across all layers of closed-source software representations. SensorLoader exploits open-source knowledge, potentially derived from structured vendor description files or unstructured vendor datasheets, to extract and infer sensor semantics. We leverage large language models to extract sensor semantics from unstructured sources and map the semantics to memory maps and structures used by the Ghidra reverse engineering framework. We formalize the limitations of this automatic extraction and demonstrate how our approach can streamline the reverse engineering process for embedded systems. Preliminary evaluations suggest that SensorLoader can effectively and scalably aid in identifying vulnerabilities and deviations from expected behaviors, offering a more efficient pathway to secure cyber-physical systems.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1145/3628356.3630117
- https://dl.acm.org/doi/pdf/10.1145/3628356.3630117
- OA Status
- gold
- Cited By
- 1
- References
- 5
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4388628965
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4388628965Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1145/3628356.3630117Digital Object Identifier
- Title
-
SensorLoader: Bridging the Gap in Cyber-Physical Reverse Engineering Across Embedded Peripheral DevicesWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-11-12Full publication date if available
- Authors
-
AnMei Dasbach-Prisk, Cory Dewitt, Luis Antonio Ribot GarcíaList of authors in order
- Landing page
-
https://doi.org/10.1145/3628356.3630117Publisher landing page
- PDF URL
-
https://dl.acm.org/doi/pdf/10.1145/3628356.3630117Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://dl.acm.org/doi/pdf/10.1145/3628356.3630117Direct OA link when available
- Concepts
-
Computer science, Firmware, Reverse engineering, Cyber-physical system, Vendor, Obfuscation, Leverage (statistics), Bridging (networking), Exploit, Software, Semantics (computer science), Embedded software, Software engineering, Programming language, Computer security, Artificial intelligence, Operating system, Marketing, BusinessTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 1Per-year citation counts (last 5 years)
- References (count)
-
5Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4388628965 |
|---|---|
| doi | https://doi.org/10.1145/3628356.3630117 |
| ids.doi | https://doi.org/10.1145/3628356.3630117 |
| ids.openalex | https://openalex.org/W4388628965 |
| fwci | 0.26843499 |
| type | article |
| title | SensorLoader: Bridging the Gap in Cyber-Physical Reverse Engineering Across Embedded Peripheral Devices |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 36 |
| biblio.first_page | 30 |
| topics[0].id | https://openalex.org/T11241 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9962000250816345 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1711 |
| topics[0].subfield.display_name | Signal Processing |
| topics[0].display_name | Advanced Malware Detection Techniques |
| topics[1].id | https://openalex.org/T12122 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9818000197410583 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1708 |
| topics[1].subfield.display_name | Hardware and Architecture |
| topics[1].display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| topics[2].id | https://openalex.org/T11424 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.98089998960495 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Security and Verification in Computing |
| funders[0].id | https://openalex.org/F4320306076 |
| funders[0].ror | https://ror.org/021nxhr62 |
| funders[0].display_name | National Science Foundation |
| funders[1].id | https://openalex.org/F4320308668 |
| funders[1].ror | https://ror.org/03taz7m60 |
| funders[1].display_name | University of Southern California |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.816761314868927 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C67212190 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7969048619270325 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q104851 |
| concepts[1].display_name | Firmware |
| concepts[2].id | https://openalex.org/C207850805 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6802135109901428 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q269608 |
| concepts[2].display_name | Reverse engineering |
| concepts[3].id | https://openalex.org/C179768478 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6624277830123901 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1120057 |
| concepts[3].display_name | Cyber-physical system |
| concepts[4].id | https://openalex.org/C2777338717 |
| concepts[4].level | 2 |
| concepts[4].score | 0.6363828778266907 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1762621 |
| concepts[4].display_name | Vendor |
| concepts[5].id | https://openalex.org/C40305131 |
| concepts[5].level | 2 |
| concepts[5].score | 0.48541244864463806 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q2616305 |
| concepts[5].display_name | Obfuscation |
| concepts[6].id | https://openalex.org/C153083717 |
| concepts[6].level | 2 |
| concepts[6].score | 0.48483145236968994 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q6535263 |
| concepts[6].display_name | Leverage (statistics) |
| concepts[7].id | https://openalex.org/C174348530 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4773861765861511 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q188635 |
| concepts[7].display_name | Bridging (networking) |
| concepts[8].id | https://openalex.org/C165696696 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4506540298461914 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q11287 |
| concepts[8].display_name | Exploit |
| concepts[9].id | https://openalex.org/C2777904410 |
| concepts[9].level | 2 |
| concepts[9].score | 0.4449017643928528 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q7397 |
| concepts[9].display_name | Software |
| concepts[10].id | https://openalex.org/C184337299 |
| concepts[10].level | 2 |
| concepts[10].score | 0.42879927158355713 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q1437428 |
| concepts[10].display_name | Semantics (computer science) |
| concepts[11].id | https://openalex.org/C154488198 |
| concepts[11].level | 3 |
| concepts[11].score | 0.41895946860313416 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q1335007 |
| concepts[11].display_name | Embedded software |
| concepts[12].id | https://openalex.org/C115903868 |
| concepts[12].level | 1 |
| concepts[12].score | 0.3741319477558136 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q80993 |
| concepts[12].display_name | Software engineering |
| concepts[13].id | https://openalex.org/C199360897 |
| concepts[13].level | 1 |
| concepts[13].score | 0.2203083634376526 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[13].display_name | Programming language |
| concepts[14].id | https://openalex.org/C38652104 |
| concepts[14].level | 1 |
| concepts[14].score | 0.20356601476669312 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[14].display_name | Computer security |
| concepts[15].id | https://openalex.org/C154945302 |
| concepts[15].level | 1 |
| concepts[15].score | 0.17429304122924805 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[15].display_name | Artificial intelligence |
| concepts[16].id | https://openalex.org/C111919701 |
| concepts[16].level | 1 |
| concepts[16].score | 0.11990699172019958 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[16].display_name | Operating system |
| concepts[17].id | https://openalex.org/C162853370 |
| concepts[17].level | 1 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q39809 |
| concepts[17].display_name | Marketing |
| concepts[18].id | https://openalex.org/C144133560 |
| concepts[18].level | 0 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[18].display_name | Business |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.816761314868927 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/firmware |
| keywords[1].score | 0.7969048619270325 |
| keywords[1].display_name | Firmware |
| keywords[2].id | https://openalex.org/keywords/reverse-engineering |
| keywords[2].score | 0.6802135109901428 |
| keywords[2].display_name | Reverse engineering |
| keywords[3].id | https://openalex.org/keywords/cyber-physical-system |
| keywords[3].score | 0.6624277830123901 |
| keywords[3].display_name | Cyber-physical system |
| keywords[4].id | https://openalex.org/keywords/vendor |
| keywords[4].score | 0.6363828778266907 |
| keywords[4].display_name | Vendor |
| keywords[5].id | https://openalex.org/keywords/obfuscation |
| keywords[5].score | 0.48541244864463806 |
| keywords[5].display_name | Obfuscation |
| keywords[6].id | https://openalex.org/keywords/leverage |
| keywords[6].score | 0.48483145236968994 |
| keywords[6].display_name | Leverage (statistics) |
| keywords[7].id | https://openalex.org/keywords/bridging |
| keywords[7].score | 0.4773861765861511 |
| keywords[7].display_name | Bridging (networking) |
| keywords[8].id | https://openalex.org/keywords/exploit |
| keywords[8].score | 0.4506540298461914 |
| keywords[8].display_name | Exploit |
| keywords[9].id | https://openalex.org/keywords/software |
| keywords[9].score | 0.4449017643928528 |
| keywords[9].display_name | Software |
| keywords[10].id | https://openalex.org/keywords/semantics |
| keywords[10].score | 0.42879927158355713 |
| keywords[10].display_name | Semantics (computer science) |
| keywords[11].id | https://openalex.org/keywords/embedded-software |
| keywords[11].score | 0.41895946860313416 |
| keywords[11].display_name | Embedded software |
| keywords[12].id | https://openalex.org/keywords/software-engineering |
| keywords[12].score | 0.3741319477558136 |
| keywords[12].display_name | Software engineering |
| keywords[13].id | https://openalex.org/keywords/programming-language |
| keywords[13].score | 0.2203083634376526 |
| keywords[13].display_name | Programming language |
| keywords[14].id | https://openalex.org/keywords/computer-security |
| keywords[14].score | 0.20356601476669312 |
| keywords[14].display_name | Computer security |
| keywords[15].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[15].score | 0.17429304122924805 |
| keywords[15].display_name | Artificial intelligence |
| keywords[16].id | https://openalex.org/keywords/operating-system |
| keywords[16].score | 0.11990699172019958 |
| keywords[16].display_name | Operating system |
| language | en |
| locations[0].id | doi:10.1145/3628356.3630117 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://dl.acm.org/doi/pdf/10.1145/3628356.3630117 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Proceedings of the First International Workshop on Security and Privacy of Sensing Systems |
| locations[0].landing_page_url | https://doi.org/10.1145/3628356.3630117 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5093252600 |
| authorships[0].author.orcid | https://orcid.org/0009-0007-9989-0822 |
| authorships[0].author.display_name | AnMei Dasbach-Prisk |
| authorships[0].countries | US |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I118069387 |
| authorships[0].affiliations[0].raw_affiliation_string | Cabrillo College, Aptos, California, United States of America |
| authorships[0].institutions[0].id | https://openalex.org/I118069387 |
| authorships[0].institutions[0].ror | https://ror.org/04srpvh96 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I118069387 |
| authorships[0].institutions[0].country_code | US |
| authorships[0].institutions[0].display_name | Cabrillo College |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Anmei Dasbach-Prisk |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Cabrillo College, Aptos, California, United States of America |
| authorships[1].author.id | https://openalex.org/A5049204174 |
| authorships[1].author.orcid | https://orcid.org/0009-0002-0256-083X |
| authorships[1].author.display_name | Cory Dewitt |
| authorships[1].countries | US |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I1174212 |
| authorships[1].affiliations[0].raw_affiliation_string | University of Southern California, Los Angeles, California, USA |
| authorships[1].institutions[0].id | https://openalex.org/I1174212 |
| authorships[1].institutions[0].ror | https://ror.org/03taz7m60 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I1174212 |
| authorships[1].institutions[0].country_code | US |
| authorships[1].institutions[0].display_name | University of Southern California |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Cory Dewitt |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | University of Southern California, Los Angeles, California, USA |
| authorships[2].author.id | https://openalex.org/A5050029555 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-5111-0694 |
| authorships[2].author.display_name | Luis Antonio Ribot García |
| authorships[2].countries | US |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I223532165 |
| authorships[2].affiliations[0].raw_affiliation_string | Kahlert School of Computing, University of Utah, Salt Lake City, Utah, United States of America |
| authorships[2].institutions[0].id | https://openalex.org/I223532165 |
| authorships[2].institutions[0].ror | https://ror.org/03r0ha626 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I223532165 |
| authorships[2].institutions[0].country_code | US |
| authorships[2].institutions[0].display_name | University of Utah |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Luis Garcia |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Kahlert School of Computing, University of Utah, Salt Lake City, Utah, United States of America |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://dl.acm.org/doi/pdf/10.1145/3628356.3630117 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | SensorLoader: Bridging the Gap in Cyber-Physical Reverse Engineering Across Embedded Peripheral Devices |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11241 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9962000250816345 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1711 |
| primary_topic.subfield.display_name | Signal Processing |
| primary_topic.display_name | Advanced Malware Detection Techniques |
| related_works | https://openalex.org/W2913519194, https://openalex.org/W2007287520, https://openalex.org/W2132360941, https://openalex.org/W4362634109, https://openalex.org/W2055981842, https://openalex.org/W4388820743, https://openalex.org/W2793135307, https://openalex.org/W2532550198, https://openalex.org/W3134235726, https://openalex.org/W2906395579 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1145/3628356.3630117 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://dl.acm.org/doi/pdf/10.1145/3628356.3630117 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Proceedings of the First International Workshop on Security and Privacy of Sensing Systems |
| best_oa_location.landing_page_url | https://doi.org/10.1145/3628356.3630117 |
| primary_location.id | doi:10.1145/3628356.3630117 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://dl.acm.org/doi/pdf/10.1145/3628356.3630117 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Proceedings of the First International Workshop on Security and Privacy of Sensing Systems |
| primary_location.landing_page_url | https://doi.org/10.1145/3628356.3630117 |
| publication_date | 2023-11-12 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W2913715209, https://openalex.org/W4387298303, https://openalex.org/W2913017407, https://openalex.org/W4200517944, https://openalex.org/W3100555097 |
| referenced_works_count | 5 |
| abstract_inverted_index.a | 30, 65, 75, 180 |
| abstract_inverted_index.We | 111, 139 |
| abstract_inverted_index.as | 4 |
| abstract_inverted_index.by | 13, 18, 133 |
| abstract_inverted_index.in | 171 |
| abstract_inverted_index.is | 28, 64 |
| abstract_inverted_index.of | 15, 46, 86, 143 |
| abstract_inverted_index.or | 101 |
| abstract_inverted_index.to | 54, 59, 78, 105, 116, 127, 184 |
| abstract_inverted_index.aid | 170 |
| abstract_inverted_index.all | 84 |
| abstract_inverted_index.and | 7, 36, 68, 107, 123, 130, 147, 168, 174 |
| abstract_inverted_index.are | 10 |
| abstract_inverted_index.can | 152, 166 |
| abstract_inverted_index.for | 158 |
| abstract_inverted_index.how | 149 |
| abstract_inverted_index.map | 124 |
| abstract_inverted_index.our | 150 |
| abstract_inverted_index.the | 38, 125, 134, 141, 154 |
| abstract_inverted_index.This | 25, 62, 71 |
| abstract_inverted_index.from | 96, 120, 176 |
| abstract_inverted_index.maps | 129 |
| abstract_inverted_index.more | 181 |
| abstract_inverted_index.such | 3 |
| abstract_inverted_index.that | 164 |
| abstract_inverted_index.this | 144 |
| abstract_inverted_index.tool | 76 |
| abstract_inverted_index.used | 132 |
| abstract_inverted_index.chain | 33 |
| abstract_inverted_index.code. | 61 |
| abstract_inverted_index.files | 100 |
| abstract_inverted_index.i.e., | 49 |
| abstract_inverted_index.infer | 108 |
| abstract_inverted_index.large | 113 |
| abstract_inverted_index.often | 11, 29 |
| abstract_inverted_index.paper | 72 |
| abstract_inverted_index.state | 16 |
| abstract_inverted_index.Ghidra | 135 |
| abstract_inverted_index.access | 58 |
| abstract_inverted_index.across | 34, 83 |
| abstract_inverted_index.driven | 12 |
| abstract_inverted_index.layers | 85 |
| abstract_inverted_index.memory | 128 |
| abstract_inverted_index.models | 56, 115 |
| abstract_inverted_index.secure | 185 |
| abstract_inverted_index.sensor | 19, 26, 81, 109, 118 |
| abstract_inverted_index.source | 60 |
| abstract_inverted_index.supply | 32 |
| abstract_inverted_index.vendor | 98, 103 |
| abstract_inverted_index.derived | 95 |
| abstract_inverted_index.entails | 42 |
| abstract_inverted_index.extract | 106, 117 |
| abstract_inverted_index.manual, | 66 |
| abstract_inverted_index.mapping | 50, 63, 80 |
| abstract_inverted_index.medical | 8 |
| abstract_inverted_index.notions | 14 |
| abstract_inverted_index.pathway | 183 |
| abstract_inverted_index.process | 157 |
| abstract_inverted_index.reverse | 44, 136, 155 |
| abstract_inverted_index.sources | 122 |
| abstract_inverted_index.suggest | 163 |
| abstract_inverted_index.through | 22 |
| abstract_inverted_index.without | 57 |
| abstract_inverted_index.approach | 151 |
| abstract_inverted_index.automate | 79 |
| abstract_inverted_index.designed | 77 |
| abstract_inverted_index.devices, | 9 |
| abstract_inverted_index.embedded | 23, 159 |
| abstract_inverted_index.expected | 177 |
| abstract_inverted_index.exploits | 91 |
| abstract_inverted_index.language | 114 |
| abstract_inverted_index.leverage | 112 |
| abstract_inverted_index.offering | 179 |
| abstract_inverted_index.pipeline | 27 |
| abstract_inverted_index.process. | 70 |
| abstract_inverted_index.provided | 17 |
| abstract_inverted_index.scalably | 169 |
| abstract_inverted_index.security | 40 |
| abstract_inverted_index.semantic | 43 |
| abstract_inverted_index.software | 52, 88 |
| abstract_inverted_index.systems, | 2 |
| abstract_inverted_index.systems. | 160, 187 |
| abstract_inverted_index.vehicles | 6 |
| abstract_inverted_index.vendors, | 35 |
| abstract_inverted_index.analyzing | 37 |
| abstract_inverted_index.automatic | 145 |
| abstract_inverted_index.efficient | 182 |
| abstract_inverted_index.firmware. | 24 |
| abstract_inverted_index.formalize | 140 |
| abstract_inverted_index.low-level | 51 |
| abstract_inverted_index.semantics | 82, 119, 126 |
| abstract_inverted_index.software, | 48 |
| abstract_inverted_index.associated | 39 |
| abstract_inverted_index.autonomous | 5 |
| abstract_inverted_index.behaviors, | 178 |
| abstract_inverted_index.deviations | 175 |
| abstract_inverted_index.extraction | 146 |
| abstract_inverted_index.fragmented | 31 |
| abstract_inverted_index.framework. | 138 |
| abstract_inverted_index.introduces | 73 |
| abstract_inverted_index.knowledge, | 93 |
| abstract_inverted_index.properties | 41 |
| abstract_inverted_index.semantics. | 110 |
| abstract_inverted_index.streamline | 153 |
| abstract_inverted_index.structured | 97 |
| abstract_inverted_index.structures | 131 |
| abstract_inverted_index.translated | 21 |
| abstract_inverted_index.Preliminary | 161 |
| abstract_inverted_index.datasheets, | 104 |
| abstract_inverted_index.demonstrate | 148 |
| abstract_inverted_index.description | 99 |
| abstract_inverted_index.effectively | 167 |
| abstract_inverted_index.engineering | 45, 137, 156 |
| abstract_inverted_index.error-prone | 69 |
| abstract_inverted_index.evaluations | 162 |
| abstract_inverted_index.identifying | 172 |
| abstract_inverted_index.information | 20 |
| abstract_inverted_index.limitations | 142 |
| abstract_inverted_index.open-source | 92 |
| abstract_inverted_index.potentially | 94 |
| abstract_inverted_index.third-party | 47 |
| abstract_inverted_index.SensorLoader | 90, 165 |
| abstract_inverted_index.unstructured | 102, 121 |
| abstract_inverted_index.SensorLoader, | 74 |
| abstract_inverted_index.closed-source | 87 |
| abstract_inverted_index.cyber-physical | 1, 55, 186 |
| abstract_inverted_index.Safety-critical | 0 |
| abstract_inverted_index.representations | 53 |
| abstract_inverted_index.time-consuming, | 67 |
| abstract_inverted_index.vulnerabilities | 173 |
| abstract_inverted_index.representations. | 89 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 90 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.51019101 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |