{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:36:21Z","timestamp":1773246981332,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,9]]},"DOI":"10.1109\/dac56929.2023.10247972","type":"proceedings-article","created":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T17:31:31Z","timestamp":1694799091000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense"],"prefix":"10.1109","author":[{"given":"Zheyuan","family":"Ma","sequence":"first","affiliation":[{"name":"University at Buffalo"}]},{"given":"Xi","family":"Tan","sequence":"additional","affiliation":[{"name":"University at Buffalo"}]},{"given":"Lukasz","family":"Ziarek","sequence":"additional","affiliation":[{"name":"University at Buffalo"}]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis"}]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"University at Buffalo"}]},{"given":"Ziming","family":"Zhao","sequence":"additional","affiliation":[{"name":"University at Buffalo"}]}],"member":"263","reference":[{"key":"ref13","article-title":"ShieLD: Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack","author":"khurshid","year":"2022","journal-title":"IEEE Transactions on Dependable and Secure Computing (TDSC)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3494107.3522774"},{"key":"ref15","article-title":"ACES: Automatic Compartments for Embedded Systems","author":"clements","year":"2018","journal-title":"USENIX Security Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.37"},{"key":"ref11","author":"yiu","year":"2020","journal-title":"The Definitive Guide to ARM Cortex-M3 and Cortex-M4 Processors"},{"key":"ref10","article-title":"Armv8.1-M Architecture Reference Manual","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"ref1","article-title":"The Arm ecosystem ships a record 6.7 billion Arm-based chips in a single quarter","year":"0"},{"key":"ref17","article-title":"AN505: Cortex-M33 with IoT kit FPGA for MPS2+ Version 2.0","year":"0"},{"key":"ref16","article-title":"Trusted Firmware-M","year":"0"},{"key":"ref8","article-title":"kGuard: Lightweight Kernel Protection against Return-to-User Attacks","author":"kemerlis","year":"2012","journal-title":"USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23227"},{"key":"ref9","article-title":"ret2dir: Rethinking kernel isolation","author":"kemerlis","year":"2014","journal-title":"USENIX Security Symposium"},{"key":"ref4","article-title":"Towards taming privilege-escalation attacks on android","author":"bugiel","year":"2012","journal-title":"Network and Distributed System Security (NDSS)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"ref6","article-title":"Horizontal privilege escalation in trusted applications","author":"suciu","year":"2020","journal-title":"USENIX Security Symposium"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363206"}],"event":{"name":"2023 60th ACM\/IEEE Design Automation Conference (DAC)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,7,9]]},"end":{"date-parts":[[2023,7,13]]}},"container-title":["2023 60th ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10247654\/10247655\/10247972.pdf?arnumber=10247972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T17:42:06Z","timestamp":1696268526000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10247972\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/dac56929.2023.10247972","relation":{},"subject":[],"published":{"date-parts":[[2023,7,9]]}}}