{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T05:19:24Z","timestamp":1735795164817,"version":"3.32.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,27]]},"DOI":"10.1109\/itnac62915.2024.10815333","type":"proceedings-article","created":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T19:24:34Z","timestamp":1735673074000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["StackSpecter: Detecting Stack Buffer Overflows for the Xtensa Architecture"],"prefix":"10.1109","author":[{"given":"Kai","family":"Lehniger","sequence":"first","affiliation":[{"name":"IHP - Leibniz-Institut f&#x00FC;r innovative Mikroelektronik Frankfurt (Oder),Germany"}]},{"given":"Peter","family":"Langend\u00f6rfer","sequence":"additional","affiliation":[{"name":"IHP - Leibniz-Institut f&#x00FC;r innovative Mikroelektronik Frankfurt (Oder),Germany"}]}],"member":"263","reference":[{"issue":"49","key":"ref1","first-page":"14","article-title":"Smashing the stack for fun and profit","volume":"7","author":"One","year":"1996","journal-title":"Phrack magazine"},{"key":"ref2","first-page":"63","article-title":"Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks","volume-title":"USENIX security symposium","volume":"98","author":"Cowan"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3230748"},{"volume-title":"Getting around non-executable stack (and fix)","year":"1997","author":"Designer","key":"ref4"},{"key":"ref5","first-page":"227","article-title":"The advanced return-into-lib (c) exploits: Pax case study","volume":"70","author":"Wojtczuk","year":"2001","journal-title":"Phrack Magazine, Volume 0\u00d70b, Issue 0x3a, Phile# 0x04 of 0x0e"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"ref7","article-title":"Stackghost: Hardware facilitated stack protection","volume-title":"10 th USENIX Security Symposium (USENIX Security 01)","author":"Frantzen","year":"2001"},{"key":"ref8","article-title":"Pointguard\u2122: Protecting pointers from buffer overflow vulnerabilities","volume-title":"12th USENIX Security Symposium (USENIX Security 03)","author":"Cowan","year":"2003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00076"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"ref11","first-page":"401","article-title":"Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Davi"},{"volume-title":"Pointer authentication on armv8.3","year":"2017","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/fi15060217"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSD51259.2020.00034"},{"key":"ref15","article-title":"Beebs: Open benchmarks for energy measurements on embedded platforms","author":"Pallister","year":"2013","journal-title":"arXiv preprint"}],"event":{"name":"2024 34th International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2024,11,27]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,11,29]]}},"container-title":["2024 34th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10815099\/10815127\/10815333.pdf?arnumber=10815333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T07:42:30Z","timestamp":1735717350000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10815333\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/itnac62915.2024.10815333","relation":{},"subject":[],"published":{"date-parts":[[2024,11,27]]}}}