{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T17:53:48Z","timestamp":1768586028341,"version":"3.49.0"},"reference-count":97,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201325"],"award-info":[{"award-number":["62201325"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Shandong Provincial Natural Science Foundation","doi-asserted-by":"publisher","award":["ZR2020QF027"],"award-info":[{"award-number":["ZR2020QF027"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Qingdao West Coast New Area Science and Technology Project","award":["2021-25"],"award-info":[{"award-number":["2021-25"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3337043","type":"journal-article","created":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T19:58:05Z","timestamp":1701115085000},"page":"133255-133280","source":"Crossref","is-referenced-by-count":5,"title":["Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-8324-0911","authenticated-orcid":false,"given":"Senyang","family":"Li","sequence":"first","affiliation":[{"name":"College of Electronic and Information Engineering, Shandong University of Science and Technology, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4964-917X","authenticated-orcid":false,"given":"Weike","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Electronic and Information Engineering, Shandong University of Science and Technology, Qingdao, China"}]},{"given":"Wenxin","family":"Li","sequence":"additional","affiliation":[{"name":"College of Electronic and Information Engineering, Shandong University of Science and Technology, Qingdao, China"}]},{"given":"Dexue","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Electronic and Information Engineering, Shandong University of Science and Technology, Qingdao, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9231-y"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.23"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/spe.515"},{"key":"ref4","first-page":"1187","article-title":"Kepler: Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerabilities","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Secur.)","author":"Wu"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.269"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-021-0342-8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966918"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.54"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.24"},{"key":"ref19","first-page":"941","article-title":"Enforcing forward-edge control-flow integrity in GCC & LLVM","volume-title":"Proc. USENIX Secur. Symp.","author":"Tice"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966920"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274739"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23318"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813671"},{"key":"ref27","first-page":"385","article-title":"ROP is still dangerous: Breaking modern defenses","volume-title":"Proc. USENIX Secur. Symp.","author":"Carlini"},{"key":"ref28","first-page":"401","article-title":"Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection","volume-title":"Proc. USENIX Secur. Symp.","author":"Davi"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/app12157750"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/s22041392"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3234184"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980026"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.03.013"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106572"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11060912"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102666"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3458471"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2995838"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.2984407"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3398327"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3371151"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2866164"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2018.00093"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.9"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2014.6881460"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744847"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029830"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/DSD57027.2022.00067"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857722"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2017.2784416"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3390\/app9204229"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102644"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3129743"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.16"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975037"},{"key":"ref56","first-page":"249","article-title":"A systematic evaluation of transient execution attacks and defenses","volume-title":"Proc. USENIX Secur. Symp.","author":"Canella"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3399742"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3357033"},{"key":"ref59","volume-title":"Return to Libc","author":"El Sherei","year":"2023"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23271"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23477"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03542-1"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818016"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23271"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813676"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243797"},{"key":"ref67","first-page":"131","article-title":"Efficient protection of path-sensitive control security","volume-title":"Proc. USENIX Secur. Symp.","author":"Ding"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813644"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23279"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3012645"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.20211101.oa7"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3012640"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898098"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898061"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2748000"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78813-5_39"},{"key":"ref78","first-page":"63","article-title":"StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks","volume-title":"Proc. USENIX Secur. Symp.","author":"Cowan"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/APCC47188.2019.9026496"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_17"},{"issue":"3","key":"ref81","first-page":"213","article-title":"Efficient hardware design and implementation of AES cryptosystem","volume":"2","author":"Ghewari","year":"2010","journal-title":"Int. J. Eng. Sci. Technol."},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263958"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3035965"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.3850\/9783981537079_0550"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3093336.3037716"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.18"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/2907611"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP-W.2014.7046672"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076739"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694383"},{"key":"ref92","first-page":"2","volume-title":"The rocket chip generator","volume":"17","author":"Asanovic","year":"2016"},{"key":"ref93","article-title":"Profile-guided, multi-version binary rewriting","author":"Meng","year":"2020","journal-title":"arXiv:2002.07748"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1002\/9781119058397.ch12"},{"key":"ref95","first-page":"1","article-title":"LLVM and Clang: Next generation compiler technology","volume-title":"Proc. BSD Conf.","volume":"5","author":"Lattner"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2548561"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10328880.pdf?arnumber=10328880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T03:57:42Z","timestamp":1709438262000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10328880\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":97,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3337043","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}