{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:06:10Z","timestamp":1767182770497,"version":"3.37.3"},"reference-count":7,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Micro"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1109\/mm.2023.3273189","type":"journal-article","created":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T17:32:07Z","timestamp":1683307927000},"page":"11-18","source":"Crossref","is-referenced-by-count":5,"title":["PACMAN: Attacking ARM Pointer Authentication With Speculative Execution"],"prefix":"10.1109","volume":"43","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5635-8859","authenticated-orcid":false,"given":"Joseph","family":"Ravichandran","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1303-2461","authenticated-orcid":false,"given":"Weon Taek","family":"Na","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Jay","family":"Lang","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6206-9674","authenticated-orcid":false,"given":"Mengjia","family":"Yan","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]}],"member":"263","reference":[{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3357033"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"journal-title":"Pointer authentication on ARMv8 3 Design and analysis of the new software security instructions","year":"2017","key":"ref5"},{"key":"ref2","first-page":"249","article-title":"A systematic evaluation of transient execution attacks and defenses","author":"canella","year":"0","journal-title":"Proc 28th USENIX Secur Symp (USENIX)"},{"journal-title":"PACMAN Security Vulnerability","year":"2022","key":"ref1"}],"container-title":["IEEE Micro"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/40\/10167507\/10120652.pdf?arnumber=10120652","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T17:41:03Z","timestamp":1689615663000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10120652\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":7,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/mm.2023.3273189","relation":{},"ISSN":["0272-1732","1937-4143"],"issn-type":[{"type":"print","value":"0272-1732"},{"type":"electronic","value":"1937-4143"}],"subject":[],"published":{"date-parts":[[2023,7]]}}}