{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T02:51:51Z","timestamp":1775271111647,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319491509","type":"print"},{"value":"9783319491516","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_25","type":"book-chapter","created":{"date-parts":[[2016,11,3]],"date-time":"2016-11-03T22:09:46Z","timestamp":1478210986000},"page":"354-377","source":"Crossref","is-referenced-by-count":3,"title":["ARMv8 Shellcodes from \u2018A\u2019 to \u2018Z\u2019"],"prefix":"10.1007","author":[{"given":"Hadrien","family":"Barral","sequence":"first","affiliation":[]},{"given":"Houda","family":"Ferradi","sequence":"additional","affiliation":[]},{"given":"R\u00e9mi","family":"G\u00e9raud","sequence":"additional","affiliation":[]},{"given":"Georges-Axel","family":"Jaloyan","sequence":"additional","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"key":"25_CR1","unstructured":"ARM Limited, 110 Fulbourn Road, Cambridge, England: ARM Architecture Reference Manual. ARMv8, for ARMv8-A architecture profile (2013)"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-319-13841-1_22","volume-title":"Information Systems Security","author":"A Basu","year":"2014","unstructured":"Basu, A., Mathuria, A., Chowdary, N.: Automatic generation of compact alphanumeric shellcodes for x86. In: Prakash, A., Shyamasundar, R. (eds.) ICISS 2014. LNCS, vol. 8880, pp. 399\u2013410. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-13841-1_22"},{"key":"25_CR3","unstructured":"Bellard, F.: QEMU, a fast and portable dynamic translator. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC 2005, pp. 41\u201341. USENIX Association, Berkeley (2005). http:\/\/dl.acm.org\/citation.cfm?id=1247360.1247401"},{"issue":"1","key":"25_CR4","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1080\/13600869755875","volume":"11","author":"V Bontchev","year":"1997","unstructured":"Bontchev, V.: Future trends in virus writing. Int. Rev. Law Comput. Technol. 11(1), 129\u2013146 (1997)","journal-title":"Int. Rev. Law Comput. Technol."},{"key":"25_CR5","unstructured":"Cristofani, D.: A universal Turing machine. http:\/\/www.hevanet.com\/cristofd\/brainfuck\/utm.b"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-642-18178-8_30","volume-title":"Information Security","author":"L Davi","year":"2011","unstructured":"Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege escalation attacks on android. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346\u2013360. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-18178-8_30"},{"key":"25_CR7","unstructured":"Eller, R.: Bypassing MSB data filters for buffer overflow exploits on Intel platforms (2000). https:\/\/web.archive.org\/web\/20070221035114\/community.core-sdi.com\/~juliano\/bypass-msb.txt"},{"key":"25_CR8","unstructured":"Faase, F.: BF is Turing-complete. http:\/\/www.iwriteiam.nl\/Ha_bf_Turing.html"},{"key":"25_CR9","unstructured":"Kernighan, B.W., Ritchie, D.M.: The M4 macro processor. Bell Laboratories (1977)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Mason, J., Small, S., Monrose, F., MacManus, G.: English shellcode. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, pp. 524\u2013533 (2009)","DOI":"10.1145\/1653662.1653725"},{"key":"25_CR11","unstructured":"Metasploit Project: The Metasploit Framework. http:\/\/www.metasploit.com\/"},{"key":"25_CR12","unstructured":"Obscou: Building IA32 Unicode-proof shellcodes. Phrack (61) (2003). http:\/\/phrack.org\/issues\/61\/11.html"},{"key":"25_CR13","unstructured":"One, A.: Smashing the stack for fun and profit. Phrack (49) (1996). http:\/\/phrack.org\/issues\/49\/14.html"},{"key":"25_CR14","unstructured":"Qualcomm: Dragonboard 410c. https:\/\/developer.qualcomm.com\/hardware\/dragonboard-410c"},{"key":"25_CR15","unstructured":"Raiter, B.: http:\/\/www.muppetlabs.com\/~breadbox\/bf\/"},{"key":"25_CR16","unstructured":"RIX: Writing IA32 alphanumeric shellcodes. Phrack (57) (2001). http:\/\/phrack.org\/issues\/57\/15.html"},{"key":"25_CR17","unstructured":"Detristan, T., Ulenspiegel, T., Malcom, Y., Von Underduk, M.S.: Polymorphic shellcode engine using spectrum analysis. Phrack (61) (2003). http:\/\/phrack.org\/issues\/61\/9.html"},{"key":"25_CR18","unstructured":"Tan, G., Croft, J.: An empirical security study of the native code in the JDK. In: Usenix Security Symposium, pp. 365\u2013378 (2008)"},{"key":"25_CR19","unstructured":"Xing, L., Bai, X., Li, T., Wang, X., Chen, K., Liao, X., Hu, S.M., Han, X.: Unauthorized cross-app. resource access on Mac OS X and iOS. arXiv preprint arXiv:1505.06836 (2015)"},{"key":"25_CR20","unstructured":"Younan, Y., Philippaerts, P.: Alphanumeric RISC ARM shellcode. Phrack 66 (2009), available at http:\/\/phrack.org\/issues\/66\/12.html"},{"issue":"3","key":"25_CR21","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s11416-010-0146-0","volume":"7","author":"Y Younan","year":"2011","unstructured":"Younan, Y., Philippaerts, P., Piessens, F., Joosen, W., Lachmund, S., Walter, T.: Filter-resistant code injection on ARM. J. Comput. Virol. 7(3), 173\u2013188 (2011)","journal-title":"J. Comput. Virol."}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T22:46:24Z","timestamp":1498344384000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}