{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:56:16Z","timestamp":1759334176224,"version":"build-2065373602"},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda??o para a Ci?ncia e a Tecnologia","doi-asserted-by":"publisher","award":["2021.08587.BD","2024.07347.IACDC"],"award-info":[{"award-number":["2021.08587.BD","2024.07347.IACDC"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3610033","type":"journal-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T17:38:38Z","timestamp":1757957918000},"page":"161844-161853","source":"Crossref","is-referenced-by-count":0,"title":["Function-Oriented Programming Attacks on ARM Cortex-M Processors"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3433-9809","authenticated-orcid":false,"given":"Andr\u00e9","family":"Cirne","sequence":"first","affiliation":[{"name":"Departamento de Ci&#x00EA;ncia de Computadores, Faculdade de Ci&#x00EA;ncias, Universidade do Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0268-9134","authenticated-orcid":false,"given":"Patr\u00edcia R.","family":"Sousa","sequence":"additional","affiliation":[{"name":"INSIGHTSEC, Lda, Aveiro, Portugal"}]},{"given":"Lu\u00eds","family":"Antunes","sequence":"additional","affiliation":[{"name":"Departamento de Ci&#x00EA;ncia de Computadores, Faculdade de Ci&#x00EA;ncias, Universidade do Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0125-4240","authenticated-orcid":false,"given":"Jo\u00e3o S.","family":"Resende","sequence":"additional","affiliation":[{"name":"Departamento de Ci&#x00EA;ncia de Computadores, Faculdade de Ci&#x00EA;ncias, Universidade do Porto, Porto, Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2014.28"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3337167.3337175"},{"volume-title":"Armv8.1-m Pointer Authentication and Branch Target Identification Extension","year":"2021","author":"Mujumdar","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433189"},{"article-title":"Bypassing modern CPU protections with function-oriented programming","year":"2023","author":"Stratton","key":"ref7"},{"key":"ref8","first-page":"177","article-title":"$PAC$ it up: Towards pointer integrity using $ARM$ pointer authentication","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Secur.)","author":"Liljestrand"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"volume-title":"CMSIS 6 Documentation","year":"2025","author":"Ltd","key":"ref11"},{"volume-title":"FreeRTOS: Real-Time Operating System for Microcontrollers","year":"2025","key":"ref12"},{"volume-title":"Eclipse ThreadX: Real-Time Operating System","year":"2025","key":"ref13"},{"volume-title":"RTX Real-Time Operating System","year":"2019","key":"ref14"},{"volume-title":"Kernel Threat Model","year":"2025","key":"ref15"},{"volume-title":"Mpu_Syscall_Numbers.h\u2013Freertos Kernel","year":"2025","key":"ref16"},{"volume-title":"Tx_Thread_Schedule.s-Cortex-M23 IAR Port","year":"2025","author":"ThreadX","key":"ref17"},{"volume-title":"Fop Mythoclast","year":"2023","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978340"},{"volume-title":"Capstone Engine","year":"2025","key":"ref20"},{"key":"ref21","first-page":"5609","article-title":"Unveiling $IoT$ security in reality: A $firmware-centric$ journey","volume-title":"Proc. 33rd USENIX Secur. Symp. (USENIX Secur.)","author":"Nino"},{"volume-title":"FreeRTOS Kernel-Timers.c Source File","year":"2025","key":"ref22"},{"volume-title":"Tx_Timer_Expiration_Process.C-Line 356, Commit 7ad78c4","year":"2025","key":"ref23"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11164498.pdf?arnumber=11164498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T13:33:09Z","timestamp":1759239189000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11164498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3610033","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}