{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:28:52Z","timestamp":1725902932698},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_30","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:02:27Z","timestamp":1499140947000},"page":"321-329","source":"Crossref","is-referenced-by-count":0,"title":["EE-CFI: Externalized Control Flow Integrity for Embedded Devices"],"prefix":"10.1007","author":[{"given":"Valentin","family":"Lefils","sequence":"first","affiliation":[]},{"given":"Gilles","family":"Grimaud","sequence":"additional","affiliation":[]},{"given":"Julien","family":"Iguchi-Cartigny","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"30_CR1","doi-asserted-by":"publisher","unstructured":"Abadi, M., Budiu, M., Erlingsson, \u00da., Ligatti, J.: Control-flow integrity. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, pp. 340\u2013353. ACM, New York (2005). doi:\n10.1145\/1102120.1102165","DOI":"10.1145\/1102120.1102165"},{"key":"30_CR2","doi-asserted-by":"publisher","unstructured":"Mashtizadeh, A.J., Bittau, A., Boneh, D., Mazi\u00e8res, D.: CCFI: cryptographically enforced control flow integrity. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 941\u2013951. ACM, New York (2015). doi:\n10.1145\/2810103.2813676","DOI":"10.1145\/2810103.2813676"},{"key":"30_CR3","doi-asserted-by":"publisher","unstructured":"Mohan, V., Larsen, P., Brunthaler, S., Hamlen, K.W., Franz, M.: Opaque control-flow integrity. In: Internet Society (2015). doi:\n10.14722\/ndss.2015.23271","DOI":"10.14722\/ndss.2015.23271"},{"key":"30_CR4","unstructured":"Coudray, T., Fontaine, A., Chifflier, P.: PICON: Control Flow Integrity on LLVM IR"},{"key":"30_CR5","unstructured":"Carlini, N., Barresi, A., Payer, M., Wagner, D., Gross, T.R.: Control-flow bending: on the effectiveness of control-flow integrity, pp. 161\u201376 (2015). \nhttps:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/carlini"},{"key":"30_CR6","doi-asserted-by":"publisher","unstructured":"Evans, I., Long, F., Otgonbaatar, U., Shrobe, H., Rinard, M., Okhravi, H., Sidiroglou-Douskos, S.: Control Jujutsu: on the weaknesses of fine-grained control flow integrity. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 901\u2013913. ACM, New York (2015). doi:\n10.1145\/2810103.2813646","DOI":"10.1145\/2810103.2813646"},{"key":"30_CR7","doi-asserted-by":"publisher","unstructured":"Conti, M., Crane, S., Davi, L., Franz, M., Larsen, P., Negro, M., Liebchen, C., Qunaibit, M., Sadeghi, A.-R.: Losing control: on the effectiveness of control-flow integrity under stack attacks. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 952\u2013963. ACM, New York (2015). doi:\n10.1145\/2810103.2813671","DOI":"10.1145\/2810103.2813671"},{"key":"30_CR8","unstructured":"Otgonbaatar, U.: Evaluating Modern Defenses Against Control Flow Hijacking. MIT Lincoln Laboratory (2015). \nhttp:\/\/people.csail.mit.edu\/hes\/ROP\/Publications\/ulzi-thesis.pdf"},{"key":"30_CR9","doi-asserted-by":"publisher","unstructured":"Lattner, C., Adve, V.: LLVM: a compilation framework for lifelong program analysis transformation. In: International Symposium on Code Generation and Optimization, CGO 2004, pp. 75\u201386 (2004). doi:\n10.1109\/CGO.2004.1281665","DOI":"10.1109\/CGO.2004.1281665"},{"key":"30_CR10","unstructured":"RTOS - Free Professionally Developed and Robust Real Time Operating System for Small Embedded Systems Development. \nhttp:\/\/www.freertos.org\/RTOS.html\n\n. Accessed 29 Aug 2016"},{"key":"30_CR11","unstructured":"STM32F4 Series - STMicroelectronics. \nhttp:\/\/www.st.com\/content\/st_com\/en\/products\/microcontrollers\/stm32-32-bit-arm-cortex-mcus\/stm32f4-series.html?querycriteria=productId=SS1577\n\n. Accessed 29 Aug 2016"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:14:24Z","timestamp":1499141664000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_30","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}