{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T18:23:26Z","timestamp":1744827806206,"version":"3.40.3"},"publisher-location":"Cham","reference-count":64,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030997656"},{"type":"electronic","value":"9783030997663"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99766-3_5","type":"book-chapter","created":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T18:20:19Z","timestamp":1648232419000},"page":"100-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with\u00a0ARM Pointer Authentication"],"prefix":"10.1007","author":[{"given":"Robert","family":"Schilling","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Nasahl","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Mangard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,26]]},"reference":[{"key":"5_CR1","unstructured":"26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, 16\u201318 August 2017 (2017). https:\/\/www.usenix.org\/conference\/usenixsecurity17"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Abadi, M., Budiu, M., Erlingsson, \u00da., Ligatti, J.: Control-flow integrity. In: Conference on Computer and Communications Security - CCS 2005 (2005). https:\/\/doi.org\/10.1145\/1102120.1102165","DOI":"10.1145\/1102120.1102165"},{"issue":"6","key":"5_CR3","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1109\/71.774911","volume":"10","author":"Z Alkhalifa","year":"1999","unstructured":"Alkhalifa, Z., Nair, V.S.S., Krishnamurthy, N., Abraham, J.A.: Design and evaluation of system-level checks for on-line control flow error detection. IEEE Trans. Parallel Distrib. Syst. 10(6), 627\u2013641 (1999). https:\/\/doi.org\/10.1109\/71.774911","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"5_CR4","doi-asserted-by":"publisher","first-page":"4","DOI":"10.13154\/tosc.v2017.i1.4-44","volume":"2017","author":"R Avanzi","year":"2017","unstructured":"Avanzi, R.: The QARMA block cipher family. Almost MDS matrices over rings with zero divisors, nearly symmetric even-mansour constructions with non-involutory central rounds, and search heuristics for low-latency S-boxes. IACR Trans. Symmetric Cryptol. 2017(1), 4\u201344 (2017). https:\/\/doi.org\/10.13154\/tosc.v2017.i1.4-44","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"5_CR5","unstructured":"Azad, B.: Examining Pointer Authentication on the iPhone XS (2019). https:\/\/googleprojectzero.blogspot.com\/2019\/02\/examining-pointer-authentication-on.html. Accessed 10 Dec 2021"},{"issue":"2","key":"5_CR6","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. Proc. IEEE 94(2), 370\u2013382 (2006). https:\/\/doi.org\/10.1109\/JPROC.2005.862424","journal-title":"Proc. IEEE"},{"issue":"4","key":"5_CR7","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TC.2003.1190590","volume":"52","author":"G Bertoni","year":"2003","unstructured":"Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Trans. Comput. 52(4), 492\u2013505 (2003). https:\/\/doi.org\/10.1109\/TC.2003.1190590","journal-title":"IEEE Trans. Comput."},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology\u2014CRYPTO 1997","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513\u2013525. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052259"},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"Bl\u00f6mer, J., da Silva, R.G., G\u00fcnther, P., Kr\u00e4mer, J., Seifert, J.: A practical second-order fault attack against a real-world pairing implementation. In: Fault Diagnosis and Tolerance in Cryptography - FDTC 2014 (2014). https:\/\/doi.org\/10.1109\/FDTC.2014.22","DOI":"10.1109\/FDTC.2014.22"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology\u2014EUROCRYPT 1997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-69053-0_4"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"102860","DOI":"10.1016\/j.micpro.2019.102860","volume":"71","author":"S Carr\u00e9","year":"2019","unstructured":"Carr\u00e9, S., Desjardins, M., Facon, A., Guilley, S.: Exhaustive single bit fault analysis A use case against Mbedtls and OpenSSL\u2019s protection on ARM and Intel CPU. Microprocess. Microsyst. 71, 102860 (2019). https:\/\/doi.org\/10.1016\/j.micpro.2019.102860","journal-title":"Microprocess. Microsyst."},{"key":"5_CR12","doi-asserted-by":"publisher","unstructured":"Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A., Shacham, H., Winandy, M.: Return-oriented programming without returns. In: Conference on Computer and Communications Security - CCS 2010 (2010). https:\/\/doi.org\/10.1145\/1866307.1866370","DOI":"10.1145\/1866307.1866370"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.cose.2017.03.013","volume":"68","author":"R de Clercq","year":"2017","unstructured":"de Clercq, R., G\u00f6tzfried, J., \u00dcbler, D., Maene, P., Verbauwhede, I.: SOFIA: software and control flow integrity architecture. Comput. Secur. 68, 16\u201335 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.03.013","journal-title":"Comput. Secur."},{"key":"5_CR14","unstructured":"Standard Performance Evaluation Corporation: SPEC CPU 2017 (2019). https:\/\/www.spec.org\/cpu2017. Accessed 10 Dec 2021"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Evans, I., et al.: Missing the Point(er): on the effectiveness of code pointer integrity. In: IEEE Symposium on Security and Privacy - S&P 2015 (2015). https:\/\/doi.org\/10.1109\/SP.2015.53","DOI":"10.1109\/SP.2015.53"},{"key":"5_CR16","unstructured":"Raspberry Pi Foundation: Raspberry Pi 4 Model B (2020). https:\/\/www.raspberrypi.org\/products\/raspberry-pi-4-model-b. Accessed 10 Dec 2021"},{"key":"5_CR17","unstructured":"Free60.org: Reset Glitch Hack. https:\/\/free60.org\/Reset_Glitch_Hack\/. Accessed 10 Dec 2021"},{"key":"5_CR18","doi-asserted-by":"publisher","unstructured":"Goloubeva, O., Rebaudengo, M., Reorda, M.S., Violante, M.: Soft-error detection using control flow assertions. In: IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology - DFT 2003 (2003). https:\/\/doi.org\/10.1109\/DFTVS.2003.1250158","DOI":"10.1109\/DFTVS.2003.1250158"},{"key":"5_CR19","unstructured":"NCC Group: There\u2019s a Hole in Your SoC: Glitching the MediaTek BootROM. https:\/\/research.nccgroup.com\/2020\/10\/15\/theres-a-hole-in-your-soc-glitching-the-mediatek-bootrom. Accessed 10 Dec 2021"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.cose.2019.05.004","volume":"85","author":"K Heydemann","year":"2019","unstructured":"Heydemann, K., Lalande, J., Berthom\u00e9, P.: Formally verified software countermeasures for control-flow integrity of smart card C code. Comput. Secur. 85, 202\u2013224 (2019). https:\/\/doi.org\/10.1016\/j.cose.2019.05.004","journal-title":"Comput. Secur."},{"key":"5_CR21","doi-asserted-by":"publisher","unstructured":"Hu, H., Shinde, S., Adrian, S., Chua, Z.L., Saxena, P., Liang, Z.: Data-oriented programming: on the expressiveness of non-control data attacks. In: IEEE Symposium on Security and Privacy - S&P 2016 (2016). https:\/\/doi.org\/10.1109\/SP.2016.62","DOI":"10.1109\/SP.2016.62"},{"key":"5_CR22","unstructured":"Hund, R., Holz, T., Freiling, F.C.: Return-oriented rootkits: bypassing kernel code integrity protection mechanisms. In: USENIX Security Symposium - USENIX 2009 (2009). http:\/\/www.usenix.org\/events\/sec09\/tech\/full_papers\/hund.pdf"},{"key":"5_CR23","unstructured":"Apple Inc.: Apple SoC security. https:\/\/support.apple.com\/guide\/security\/apple-soc-security-sec87716a080\/web. Accessed 10 Dec 2021"},{"key":"5_CR24","doi-asserted-by":"publisher","unstructured":"Jaloyan, G., Markantonakis, K., Akram, R.N., Robin, D., Mayes, K., Naccache, D.: Return-oriented programming on RISC-V. In: Asia Conference on Computer and Communications Security - AsiaCCS 2020 (2020). https:\/\/doi.org\/10.1145\/3320269.3384738","DOI":"10.1145\/3320269.3384738"},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-28632-5_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N Joshi","year":"2004","unstructured":"Joshi, N., Wu, K., Karri, R.: Concurrent error detection schemes for involution ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 400\u2013412. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_29"},{"key":"5_CR26","doi-asserted-by":"publisher","unstructured":"Kim, Y., et al.: Flipping bits in memory without accessing them: an experimental study of DRAM disturbance errors. In: International Symposium on Computer Architecture - ISCA 2014 (2014). https:\/\/doi.org\/10.1109\/ISCA.2014.6853210","DOI":"10.1109\/ISCA.2014.6853210"},{"key":"5_CR27","unstructured":"Kuznetsov, V., Szekeres, L., Payer, M., Candea, G., Sekar, R., Song, D.: Code-pointer integrity. In: Operating Systems Design and Implementation - OSDI 2014 (2014). https:\/\/www.usenix.org\/conference\/osdi14\/technical-sessions\/presentation\/kuznetsov"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-319-11212-1_12","volume-title":"Computer Security - ESORICS 2014","author":"J-F Lalande","year":"2014","unstructured":"Lalande, J.-F., Heydemann, K., Berthom\u00e9, P.: Software countermeasures for control flow integrity of smart card C codes. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 200\u2013218. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11212-1_12"},{"key":"5_CR29","doi-asserted-by":"publisher","unstructured":"Lattner, C., Adve, V.S.: LLVM: a compilation framework for lifelong program analysis & transformation. In: Symposium on Code Generation and Optimization - CGO 2004 (2004). https:\/\/doi.org\/10.1109\/CGO.2004.1281665","DOI":"10.1109\/CGO.2004.1281665"},{"key":"5_CR30","unstructured":"Lee, J., et al.: Hacking in darkness: return-oriented programming against secure enclaves. In: USENIX Security Symposium - USENIX 2017 [1]. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/lee-jaehyuk"},{"key":"5_CR31","doi-asserted-by":"publisher","unstructured":"Liao, H., Gebotys, C.H.: Methodology for EM fault injection: charge-based fault model. In: Design, Automation & Test in Europe - DATE 2019 (2019). https:\/\/doi.org\/10.23919\/DATE.2019.8715150","DOI":"10.23919\/DATE.2019.8715150"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Liljestrand, H., Nyman, T., Gunn, L.J., Ekberg, J., Asokan, N.: PACStack: an authenticated call stack. CoRR (2019). http:\/\/arxiv.org\/abs\/1905.10242","DOI":"10.1145\/3316781.3322469"},{"key":"5_CR33","unstructured":"Liljestrand, H., Nyman, T., Wang, K., Perez, C.C., Ekberg, J., Asokan, N.: PAC it up: towards pointer integrity using ARM pointer authentication. In: USENIX Security Symposium - USENIX 2019 (2019). https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/liljestrand"},{"key":"5_CR34","unstructured":"ARM Limited: Inside the numbers: 100 billion ARM-based chips. https:\/\/community.arm.com\/developer\/ip-products\/processors\/b\/processors-ip-blog\/posts\/inside-the-numbers-100-billion-arm-based-chips-1345571105. Accessed 10 Dec 2021"},{"key":"5_CR35","unstructured":"ARM Limited: ARM architecture reference manual ARMv8, for ARMv8-a architecture profile (2020). https:\/\/documentation-service.arm.com\/static\/5fa3bd1eb209f547eebd4141. Accessed 10 Dec 2021"},{"key":"5_CR36","unstructured":"ARM Limited: ARM\u2019s solution to the future needs of AI, security and specialized computing is v9. https:\/\/www.arm.com\/company\/news\/2021\/03\/arms-answer-to-the-future-of-ai-armv9-architecture. Accessed 10 Dec 2021"},{"key":"5_CR37","unstructured":"Marinas, C.: Memory Layout on AArch64 Linux (2020). https:\/\/www.kernel.org\/doc\/html\/latest\/arm64\/memory.html. Accessed 10 Dec 2021"},{"key":"5_CR38","doi-asserted-by":"publisher","unstructured":"Mashtizadeh, A.J., Bittau, A., Boneh, D., Mazi\u00e8res, D.: CCFI: cryptographically enforced control flow integrity. In: Conference on Computer and Communications Security - CCS 2015 (2015). https:\/\/doi.org\/10.1145\/2810103.2813676","DOI":"10.1145\/2810103.2813676"},{"key":"5_CR39","doi-asserted-by":"publisher","unstructured":"Moro, N., Dehbaoui, A., Heydemann, K., Robisson, B., Encrenaz, E.: Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller. In: Fault Diagnosis and Tolerance in Cryptography - FDTC 2013 (2013). https:\/\/doi.org\/10.1109\/FDTC.2013.9","DOI":"10.1109\/FDTC.2013.9"},{"key":"5_CR40","doi-asserted-by":"publisher","unstructured":"Murdock, K., Oswald, D.F., Garcia, F.D., Bulck, J.V., Gruss, D., Piessens, F.: Plundervolt: software-based fault injection attacks against Intel SGX. In: IEEE Symposium on Security and Privacy - S&P 2020 (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00057","DOI":"10.1109\/SP40000.2020.00057"},{"key":"5_CR41","unstructured":"Nasahl, P., Timmers, N.: Attacking AUTOSAR using software and hardware attacks. In: escar, USA (2019)"},{"issue":"1","key":"5_CR42","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/24.994926","volume":"51","author":"N Oh","year":"2002","unstructured":"Oh, N., Shirvani, P.P., McCluskey, E.J.: Control-flow checking by software signatures. IEEE Trans. Reliab. 51(1), 111\u2013122 (2002). https:\/\/doi.org\/10.1109\/24.994926","journal-title":"IEEE Trans. Reliab."},{"key":"5_CR43","unstructured":"Patterson, D., Bennett, J., Palmer Dabbelt, C.G., Madhusudan, G.S., Mudge, T.: Embench$$^\\text{TM}$$: A Modern Embedded Benchmark Suite. https:\/\/www.embench.org. Accessed 10 Dec 2021"},{"key":"5_CR44","unstructured":"QEMU: QEMU the FAST! Processor Emulator (2020). https:\/\/www.qemu.org. Accessed 10 Dec 2021"},{"key":"5_CR45","doi-asserted-by":"publisher","unstructured":"Qiu, P., Wang, D., Lyu, Y., Qu, G.: VoltJockey: breaching TrustZone by software-controlled voltage manipulation over multi-core frequencies. In: Conference on Computer and Communications Security - CCS 2019 (2019). https:\/\/doi.org\/10.1145\/3319535.3354201","DOI":"10.1145\/3319535.3354201"},{"key":"5_CR46","unstructured":"Qualcomm Technologies, Inc.: Pointer Authentication on ARMv8.3 (2017). https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointer-authentication-on-armv8-3.pdf. Accessed 10 Dec 2021"},{"key":"5_CR47","doi-asserted-by":"publisher","unstructured":"Reis, G.A., Chang, J., Vachharajani, N., Rangan, R., August, D.I.: SWIFT: software implemented fault tolerance. In: Symposium on Code Generation and Optimization - CGO 2005 (2005). https:\/\/doi.org\/10.1109\/CGO.2005.34","DOI":"10.1109\/CGO.2005.34"},{"key":"5_CR48","unstructured":"Rott, J.K.: Intel\u00aeAdvanced Encryption Standard Instructions (AES-NI) (2012). https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-advanced-encryption-standard-instructions-aes-ni.html. Accessed 10 Dec 2021"},{"key":"5_CR49","doi-asserted-by":"publisher","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In: Conference on Computer and Communications Security - CCS 2007 (2007). https:\/\/doi.org\/10.1145\/1315245.1315313","DOI":"10.1145\/1315245.1315313"},{"issue":"4","key":"5_CR50","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1587\/transele.E94.C.477","volume":"94","author":"M Sugihara","year":"2011","unstructured":"Sugihara, M.: A dynamic continuous signature monitoring technique for reliable microprocessors. IEICE Trans. Electron. 94(4), 477\u2013486 (2011). https:\/\/doi.org\/10.1587\/transele.E94.C.477","journal-title":"IEICE Trans. Electron."},{"key":"5_CR51","unstructured":"Tang, A., Sethumadhavan, S., Stolfo, S.J.: CLKSCREW: exposing the perils of security-oblivious energy management. In: USENIX Security Symposium - USENIX 2017 [1]. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/tang"},{"key":"5_CR52","unstructured":"Tatar, A., Konoth, R.K., Athanasopoulos, E., Giuffrida, C., Bos, H., Razavi, K.: Throwhammer: rowhammer attacks over the network and defenses. In: USENIX Annual Technical Conference - USENIX ATC 2018 (2018). https:\/\/www.usenix.org\/conference\/atc18\/presentation\/tatar"},{"key":"5_CR53","unstructured":"Tice, C., et al.: Enforcing forward-edge control-flow integrity in GCC & LLVM. In: USENIX Security Symposium - USENIX 2014 (2014). https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/tice"},{"key":"5_CR54","doi-asserted-by":"publisher","unstructured":"Timmers, N., Mune, C.: Escalating privileges in Linux using voltage fault injection. In: Fault Diagnosis and Tolerance in Cryptography - FDTC 2017 (2017). https:\/\/doi.org\/10.1109\/FDTC.2017.16","DOI":"10.1109\/FDTC.2017.16"},{"key":"5_CR55","doi-asserted-by":"publisher","unstructured":"Timmers, N., Spruyt, A., Witteman, M.: Controlling PC on ARM using fault injection. In: Fault Diagnosis and Tolerance in Cryptography - FDTC 2016 (2016). https:\/\/doi.org\/10.1109\/FDTC.2016.18","DOI":"10.1109\/FDTC.2016.18"},{"key":"5_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-030-41702-4_8","volume-title":"Information Security Theory and Practice","author":"T Trouchkine","year":"2020","unstructured":"Trouchkine, T., Bouffard, G., Cl\u00e9di\u00e8re, J.: Fault injection characterization on modern CPUs. In: Laurent, M., Giannetsos, T. (eds.) WISTP 2019. LNCS, vol. 12024, pp. 123\u2013138. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41702-4_8"},{"key":"5_CR57","doi-asserted-by":"publisher","unstructured":"van der Veen, V., et al.: Drammer: deterministic rowhammer attacks on mobile platforms. In: Conference on Computer and Communications Security - CCS 2016 (2016). https:\/\/doi.org\/10.1145\/2976749.2978406","DOI":"10.1145\/2976749.2978406"},{"key":"5_CR58","doi-asserted-by":"publisher","unstructured":"Venkatasubramanian, R., Hayes, J.P., Murray, B.T.: Low-cost on-line fault detection using control flow assertions. In: International Symposium on On-Line Testing and Robust System Design - IOLTS 2003 (2003). https:\/\/doi.org\/10.1109\/OLT.2003.1214380","DOI":"10.1109\/OLT.2003.1214380"},{"key":"5_CR59","doi-asserted-by":"publisher","unstructured":"Werner, M., Unterluggauer, T., Schaffenrath, D., Mangard, S.: Sponge-based control-flow protection for IoT devices. In: IEEE European Symposium on Security and Privacy - EURO S&P 2018 (2018). https:\/\/doi.org\/10.1109\/EuroSP.2018.00023","DOI":"10.1109\/EuroSP.2018.00023"},{"key":"5_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-31271-2_10","volume-title":"Smart Card Research and Advanced Applications","author":"M Werner","year":"2016","unstructured":"Werner, M., Wenger, E., Mangard, S.: Protecting the control flow of embedded processors against fault attacks. In: Homma, N., Medwed, M. (eds.) CARDIS 2015. LNCS, vol. 9514, pp. 161\u2013176. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31271-2_10"},{"key":"5_CR61","doi-asserted-by":"publisher","unstructured":"Wilken, K.D., Shen, J.P.: Continuous signature monitoring: efficient concurrent-detection of processor control errors. In: International Test Conference - ITC 1988 (1988). https:\/\/doi.org\/10.1109\/TEST.1988.207880","DOI":"10.1109\/TEST.1988.207880"},{"issue":"6","key":"5_CR62","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/43.55193","volume":"9","author":"KD Wilken","year":"1990","unstructured":"Wilken, K.D., Shen, J.P.: Continuous signature monitoring: low-cost concurrent detection of processor control errors. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 9(6), 629\u2013641 (1990). https:\/\/doi.org\/10.1109\/43.55193","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circ. Syst."},{"key":"5_CR63","unstructured":"Google Project Zero: Exploiting the DRAM rowhammer bug to gain kernel privileges (2015). https:\/\/googleprojectzero.blogspot.com\/2015\/03\/exploiting-dram-rowhammer-bug-to-gain.html. Accessed 10 Dec 2021"},{"key":"5_CR64","unstructured":"Zhang, M., Sekar, R.: Control flow integrity for COTS binaries. In: USENIX Security Symposium - USENIX 2013 (2013). https:\/\/www.usenix.org\/conference\/usenixsecurity13\/technical-sessions\/presentation\/Zhang"}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99766-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T23:03:24Z","timestamp":1649199804000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99766-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030997656","9783030997663"],"references-count":64,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99766-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"26 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COSADE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Constructive Side-Channel Analysis and Secure Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leuven","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cosade2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cosade.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}