{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:50:24Z","timestamp":1730292624685,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/reconfig.2018.8641707","type":"proceedings-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T18:39:16Z","timestamp":1550169556000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Language Abstractions for Hardware-based Control-Flow Integrity Monitoring"],"prefix":"10.1109","author":[{"given":"William L.","family":"Harrison","sequence":"first","affiliation":[]},{"given":"Gerard","family":"Allwein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3139337.3139339"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP-W.2014.7046672"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.32"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2006.887799"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2012.2218630"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/978-3-319-45719-2_2","article-title":"Taming transactions: Towards hardware-assisted control flow integrity using transactional memory","author":"muench","year":"2016","journal-title":"Research in Attacks Intrusions and Defenses"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857722"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2543581.2543588"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228584"},{"key":"ref19","article-title":"Will the future success of reconfigurable computing require a paradigm shift in our research community&#x2019;s thinking?","author":"andrews","year":"2015","journal-title":"Keynote address Applied Reconfigurable Computing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"ref3","article-title":"A survey of hardware-based control flow integrity (CFI)","volume":"abs 1706 7257","author":"de clercq","year":"2017","journal-title":"CoRR"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1145\/1315245.1315313","article-title":"The geometry of innocent flesh on the bone: Return-intolibc without function calls (on the x86)","author":"shacham","year":"2007","journal-title":"Proceedings of the 14th ACM CCS '07"},{"journal-title":"ReConFig18 Code Base","year":"0","author":"harrison","key":"ref5"},{"key":"ref8","first-page":"161","article-title":"Controlflow bending: On the effectiveness of control-flow integrity","author":"carlini","year":"2015","journal-title":"Proceedings of the 24th USENIX Conference on Security Symposium ser SEC&#x2019;15"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813671"},{"key":"ref2","first-page":"340","article-title":"Control-flow integrity","author":"abadi","year":"2005","journal-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security ser CCS &#x2019;05"},{"journal-title":"IoT for All Webzine","year":"2017","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2967497"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16214-0_4"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2015.7393143"}],"event":{"name":"2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","start":{"date-parts":[[2018,12,3]]},"location":"Cancun, Mexico","end":{"date-parts":[[2018,12,5]]}},"container-title":["2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8637084\/8641689\/08641707.pdf?arnumber=8641707","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T01:07:31Z","timestamp":1643245651000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8641707\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/reconfig.2018.8641707","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}