{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T03:59:03Z","timestamp":1725422343850},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/asap.2007.4459298","type":"proceedings-article","created":{"date-parts":[[2008,3,5]],"date-time":"2008-03-05T20:21:20Z","timestamp":1204748480000},"page":"409-414","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Hardware Support for Control Data Validation"],"prefix":"10.1109","author":[{"given":"Yong-Joon","family":"Park","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhao","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gyungho","family":"Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","first-page":"237","article-title":"Enlisting hardware architecture to thwart malicious code injection","author":"lee","year":"0"},{"journal-title":"National vulnerability database A comprehensive cyber vulnerability resource","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2006.76"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2006.4380863"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1086297.1086305"},{"key":"ref4","first-page":"63","article-title":"Automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"0"},{"key":"ref3","article-title":"Multimedia workloads versus spec cpu","author":"christoper martinez","year":"0","journal-title":"SPEC Benchmark Workshop"},{"article-title":"Stackghost: Hardware facilitated stack protection","year":"0","author":"frantzen","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.26"},{"journal-title":"Intel Corp the IA32 Intel Architecture Software Developers Manual","year":"2006","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/263580.263599"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181316"},{"key":"ref1","article-title":"Control-flow integrity:principles, implementation and application","author":"abadi","year":"2005","journal-title":"ACM Computer and Communication Security Symposium"},{"key":"ref9","article-title":"Secure execution via program shepherding","author":"kiriansky","year":"0","journal-title":"In Proceedings of 11th USENIX Security Security Symposium"}],"event":{"name":"2007 IEEE International Conf. on Application-specific Systems, Architectures and Processors","start":{"date-parts":[[2007,7,9]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2007,7,11]]}},"container-title":["2007 IEEE International Conf. on Application-specific Systems, Architectures and Processors (ASAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4429947\/4429948\/04459298.pdf?arnumber=4459298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T20:11:19Z","timestamp":1489695079000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4459298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/asap.2007.4459298","relation":{},"subject":[],"published":{"date-parts":[[2007,7]]}}}