{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:42:26Z","timestamp":1761396146487,"version":"3.28.0"},"reference-count":57,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,10]]},"DOI":"10.1109\/ewdts52692.2021.9581003","type":"proceedings-article","created":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T17:13:28Z","timestamp":1635268408000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Control-Flow Integrity for Real-Time Operating Systems: Open Issues and Challenges"],"prefix":"10.1109","author":[{"given":"Vahid Eftekhari","family":"Moghadam","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marco","family":"Meloni","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paolo","family":"Prinetto","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","first-page":"225","article-title":"kvm: the linux virtual machine monitor","volume":"1","author":"kivity","year":"2007","journal-title":"Proceedings of the Linux Symposium"},{"year":"2017","journal-title":"Pointer authentication on armv8 3 Technical report","article-title":"Qualcomm Technologies Inc","key":"ref38"},{"year":"2021","journal-title":"PREEMPT RT The Linux Kernel Real-time Patch","article-title":"The Linux Foundation","key":"ref33"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/DAC18072.2020.9218535"},{"key":"ref31","first-page":"401","article-title":"Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection","author":"davi","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/SP.2014.26"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/SP.2014.43"},{"year":"2021","journal-title":"FreeRTOS - Market leading RTOS (Real Time Operating System) for embedded systems with Internet of Things extensions","article-title":"FreeRTOS","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/1655077.1655083"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/1455770.1455775"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/2810103.2813671"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/2857705.2857722"},{"key":"ref29","first-page":"5","article-title":"Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks","volume":"98","author":"cowan","year":"1998"},{"year":"2019","journal-title":"Ghostscript RCE through type confusion","key":"ref2"},{"year":"2015","journal-title":"Understanding type confusion vulnerabilities","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/1455770.1455776"},{"key":"ref22","first-page":"385","article-title":"Rop is still dangerous: Breaking modern defenses","author":"carlini","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/RTSS.2006.27"},{"key":"ref24","article-title":"Can dres provide long-lasting security? the case of return-oriented programming and the avc advantage","volume":"20","author":"checkoway","year":"2009","journal-title":"EVT\/WOTE"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/1866307.1866370"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/1966913.1966918"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/978-3-642-10772-6_13"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1145\/1315245.1315313"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1145\/2897937.2898098"},{"key":"ref57","article-title":"Arm pointer authentication based forward-edge and backward-edge control flow integrity for kernels","author":"yang","year":"2019","journal-title":"arXiv preprint arXiv 1912 10666"},{"key":"ref56","article-title":"Control-flow integrity for real-time embedded systems","author":"walls","year":"2019","journal-title":"31st Euromicro Conference on Real-Time Systems (ECRTS 2019)"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1109\/ICDSC.2001.918971"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1007\/978-3-642-23644-0_7"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1109\/SP.2013.13"},{"year":"2019","journal-title":"A detailed description of the Data Execution Prevention (DEP)","article-title":"Microsoft Support","key":"ref52"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.sysarc.2020.101709"},{"year":"2007","author":"afek","article-title":"Dangling pointer: Smashing the pointer for fun and profit","key":"ref11"},{"year":"2010","author":"kornau","journal-title":"Return Oriented Programming for the ARM Architecture","key":"ref40"},{"key":"ref12","first-page":"290","article-title":"Evaluation of an rtos on top of a hosted virtual machine system","author":"aichouch","year":"2013","journal-title":"2013 Conference on Design and Architectures for Signal and Image Processing"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.46586\/tosc.v2017.i1.4-44"},{"key":"ref14","first-page":"291","article-title":"Address obfuscation: An efficient approach to combat a broad range of memory error exploits","volume":"12","author":"bhatkar","year":"2003","journal-title":"USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2076732.2076783"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/1966913.1966919"},{"year":"2016","journal-title":"Armv8-a architecture &#x2013; 2016 additions","article-title":"ARM Connected Community Blog","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/LES.2018.2819983"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/IVSW.2017.8031545"},{"year":"2021","journal-title":"CCWE-120 Buffer Copy without Checking Size of Input (&#x2019;Classic Buffer Overflow&#x2019;)","key":"ref4"},{"year":"2020","journal-title":"Interactive The Top Programming Languages 2020 - IEEE Spectrum","key":"ref3"},{"year":"2021","journal-title":"Deserialization of untrusted data","key":"ref6"},{"year":"2021","journal-title":"Clang 13 documentation - CONTROL FLOW INTEGRITY","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/1609956.1609960"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1102120.1102165"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1007\/s11416-017-0299-1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.6028\/NBS.IR.76-1041"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1007\/978-3-319-46982-9_19"},{"key":"ref45","first-page":"14","article-title":"Smashing the stack for fun and profit","volume":"7","author":"one","year":"1996","journal-title":"Phrack Magazine"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1145\/2133375.2133377"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/MSP.2004.36"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/TIFS.2011.2159712"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/TIFS.2018.2797932"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/EWDTS.2019.8884464"},{"key":"ref43","article-title":"Bao: A lightweight static partitioning hypervisor for modern multi-core embedded systems","author":"martins","year":"2020","journal-title":"Workshop on Next Generation Real-Time Embedded Systems (NG-RES 2020)"}],"event":{"name":"2021 IEEE East-West Design & Test Symposium (EWDTS)","start":{"date-parts":[[2021,9,10]]},"location":"Batumi, Georgia","end":{"date-parts":[[2021,9,13]]}},"container-title":["2021 IEEE East-West Design &amp; Test Symposium (EWDTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9580973\/9580974\/09581003.pdf?arnumber=9581003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:55:55Z","timestamp":1652187355000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9581003\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,10]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/ewdts52692.2021.9581003","relation":{},"subject":[],"published":{"date-parts":[[2021,9,10]]}}}