{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:10:08Z","timestamp":1756311008650},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/memcod.2016.7797764","type":"proceedings-article","created":{"date-parts":[[2016,12,29]],"date-time":"2016-12-29T21:54:22Z","timestamp":1483048462000},"page":"1-4","source":"Crossref","is-referenced-by-count":9,"title":["SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC"],"prefix":"10.1109","author":[{"given":"Manaar","family":"Alam","sequence":"first","affiliation":[]},{"given":"Debapriya Basu","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Sarani","family":"Bhattacharya","sequence":"additional","affiliation":[]},{"given":"Vidya","family":"Govindan","sequence":"additional","affiliation":[]},{"given":"Rajat Subhra","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"OpenRISC 1000 Architecture Manual","year":"2014","key":"ref4"},{"journal-title":"Or1200 ip core specification","year":"0","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.9"},{"key":"ref6","first-page":"189","article-title":"Watchdog: Hardware for safe and secure manual memory management and full memory safety","author":"santosh","year":"2012","journal-title":"2012 39th Annual International Symposium on Computer Architecture (ISCA)"},{"journal-title":"Scut \/Team Teso Exploiting format string vulnerabilities","year":"2001","key":"ref11"},{"journal-title":"Sample exploits for openrisc linux","year":"2016","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.166"},{"journal-title":"Aleph One Smashing the stack for fun and profit","year":"1996","key":"ref7"},{"year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.36"},{"year":"0","key":"ref1"}],"event":{"name":"2016 ACM\/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE)","start":{"date-parts":[[2016,11,18]]},"location":"Kanpur","end":{"date-parts":[[2016,11,20]]}},"container-title":["2016 ACM\/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786794\/7797738\/07797764.pdf?arnumber=7797764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T13:15:31Z","timestamp":1580822131000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7797764\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/memcod.2016.7797764","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}