{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T18:04:20Z","timestamp":1761847460207,"version":"build-2065373602"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:00:00Z","timestamp":1755993600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:00:00Z","timestamp":1755993600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,24]]},"DOI":"10.1109\/rtsi64020.2025.11212515","type":"proceedings-article","created":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T17:31:42Z","timestamp":1761672702000},"page":"332-337","source":"Crossref","is-referenced-by-count":0,"title":["Deep Neural Networks Study for Advanced Code-reuse Attacks Detection"],"prefix":"10.1109","author":[{"given":"J\u00fania Ma\u00edsa","family":"Oliveira","sequence":"first","affiliation":[{"name":"University of Bologna,Electronic, and Information Engineering (DEI),Department of Electrical,Bologna,Italy"}]},{"given":"Alberto","family":"Musa","sequence":"additional","affiliation":[{"name":"University of Bologna,Electronic, and Information Engineering (DEI),Department of Electrical,Bologna,Italy"}]},{"given":"Emanuele","family":"Parisi","sequence":"additional","affiliation":[{"name":"BSC,Computer Sciences Department,Barcelona,Spain"}]},{"given":"Francesco","family":"Barchi","sequence":"additional","affiliation":[{"name":"University of Bologna,Electronic, and Information Engineering (DEI),Department of Electrical,Bologna,Italy"}]},{"given":"Andrea","family":"Acquaviva","sequence":"additional","affiliation":[{"name":"University of Bologna,Electronic, and Information Engineering (DEI),Department of Electrical,Bologna,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3386377"},{"volume-title":"Risc-v\u2019s rapid ascent in embedded systems","author":"Ramsey","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/DATE58400.2024.10546873"},{"key":"ref6","first-page":"2281","article-title":"Holistic {Control-Flow} protection on {Real-Time} embedded systems with kage","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Du"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography7040058"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3170479"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3548608.3559263"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2020.112007"},{"article-title":"Deepcheck: a non-intrusive control-flow integrity checking based on deep learning","year":"2019","author":"Zhang","key":"ref12"},{"article-title":"Embench: Open benchmarks for embedded platforms","year":"2023","author":"Patterson","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM59467.2023.10361849"},{"volume-title":"Torchinfo","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA53316.2021.9564119"}],"event":{"name":"2025 IEEE 9th Forum on Research and Technologies for Society and Industry (RTSI)","start":{"date-parts":[[2025,8,24]]},"location":"Tunis, Tunisia","end":{"date-parts":[[2025,8,26]]}},"container-title":["2025 IEEE 9th Forum on Research and Technologies for Society and Industry (RTSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11210848\/11212212\/11212515.pdf?arnumber=11212515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T17:57:59Z","timestamp":1761847079000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11212515\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/rtsi64020.2025.11212515","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]}}}