{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:19:26Z","timestamp":1740100766482,"version":"3.37.3"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Federal Ministry of Education and Research (BMBF)","doi-asserted-by":"publisher","award":["01IS18065E"],"award-info":[{"award-number":["01IS18065E"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,7]]},"DOI":"10.1109\/meco55406.2022.9797185","type":"proceedings-article","created":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T19:47:45Z","timestamp":1655840865000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Code Mutation as a mean against ROP Attacks for Embedded Systems"],"prefix":"10.1109","author":[{"given":"P.","family":"Tabatt","sequence":"first","affiliation":[{"name":"University of Applied Sciences Nordhausen,Nordhausen,Germany"}]},{"given":"J.","family":"Jelonek","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Nordhausen,Nordhausen,Germany"}]},{"given":"M.","family":"Scholzel","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Nordhausen,Nordhausen,Germany"}]},{"given":"K.","family":"Lehniger","sequence":"additional","affiliation":[{"name":"+IHP, Frankfurt (Oder),Germany"}]},{"given":"P.","family":"Langendorfer","sequence":"additional","affiliation":[{"name":"+IHP, Frankfurt (Oder),Germany"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"ref12","first-page":"291","article-title":"Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits","author":"bhatkar","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2017.7906756"},{"journal-title":"Half-blind attacks mask ROM bootloaders are dangerous","year":"2009","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2159712"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"journal-title":"ROPecker A generic and practical approachfor defending against ROP attack","year":"2014","key":"ref6"},{"journal-title":"ROPGuard Runtime prevention ofreturn-oriented programming attacks","year":"2012","key":"ref5"},{"journal-title":"PointGuardTM Protecting Pointers From Buffer Overflow Vulnerabilities","year":"2003","key":"ref8"},{"journal-title":"Kbouncer Efficient and Transparent Rop Mitigation","year":"2012","key":"ref7"},{"key":"ref2","first-page":"63","article-title":"Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"0","journal-title":"USENIX Security Symposium"},{"journal-title":"PaX address space layout randomization (ASLR)","year":"0","key":"ref1"},{"journal-title":"Random Data","year":"2008","key":"ref9"}],"event":{"name":"2022 11th Mediterranean Conference on Embedded Computing (MECO)","start":{"date-parts":[[2022,6,7]]},"location":"Budva, Montenegro","end":{"date-parts":[[2022,6,10]]}},"container-title":["2022 11th Mediterranean Conference on Embedded Computing (MECO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9797068\/9797069\/09797185.pdf?arnumber=9797185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T19:58:51Z","timestamp":1657569531000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9797185\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/meco55406.2022.9797185","relation":{},"subject":[],"published":{"date-parts":[[2022,6,7]]}}}