{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:24:27Z","timestamp":1758893067637,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,9]],"date-time":"2009-11-09T00:00:00Z","timestamp":1257724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,9]]},"DOI":"10.1145\/1655077.1655083","type":"proceedings-article","created":{"date-parts":[[2009,11,17]],"date-time":"2009-11-17T13:30:15Z","timestamp":1258464615000},"page":"19-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":66,"title":["Defending embedded systems against control flow attacks"],"prefix":"10.1145","author":[{"given":"Aur\u00e9lien","family":"Francillon","sequence":"first","affiliation":[{"name":"INRIA Rh\u00f4ne-Alpes, Montbonnot, France"}]},{"given":"Daniele","family":"Perito","sequence":"additional","affiliation":[{"name":"INRIA Rh\u00f4ne-Alpes, Montbonnot, France"}]},{"given":"Claude","family":"Castelluccia","sequence":"additional","affiliation":[{"name":"INRIA Rh\u00f4ne-Alpes, Montbonnot, France"}]}],"member":"320","published-online":{"date-parts":[[2009,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","unstructured":"S. Alexander. Defeating compiler-level buffer overflow protection. Login; 30(3) June 2005.  S. Alexander. Defeating compiler-level buffer overflow protection. Login; 30(3) June 2005."},{"key":"e_1_3_2_1_3_1","unstructured":"AMD. AMD 64 and Enhanced Virus Protection.  AMD. AMD 64 and Enhanced Virus Protection."},{"key":"e_1_3_2_1_4_1","unstructured":"Atmel 2325 Orchard Parkway San Jose CA 95131. 8-bit Microcontroller with 1K Byte of In-System Programmable Flash AT90S1200 2002.  Atmel 2325 Orchard Parkway San Jose CA 95131. 8-bit Microcontroller with 1K Byte of In-System Programmable Flash AT90S1200 2002."},{"key":"e_1_3_2_1_5_1","unstructured":"Atmel Corporation. Atmega128 datasheet. http:\/\/www.atmel.com\/atmel\/acrobat\/doc2467.pdf.  Atmel Corporation. Atmega128 datasheet. http:\/\/www.atmel.com\/atmel\/acrobat\/doc2467.pdf."},{"key":"e_1_3_2_1_6_1","first-page":"251","volume-title":"In Proceedings of the USENIX Annual Technical Conference","author":"Baratloo A.","year":"2000"},{"key":"e_1_3_2_1_7_1","unstructured":"P. F. based bit and C. Microcontrollers. Pic16f688 data sheet.  P. F. based bit and C. Microcontrollers. Pic16f688 data sheet."},{"key":"e_1_3_2_1_8_1","first-page":"177","volume-title":"In USENIX Security Symposium","author":"Chen S.","year":"2005"},{"volume-title":"USENIX Security Symposium","year":"1998","author":"Cowan C.","key":"e_1_3_2_1_9_1"},{"volume-title":"CanSecWest 2005, May 2005. Presentation at CanSecWest, french article also published in the proceidings of SSTIC 2005 \"Vuln\u00e9rabilit\u00e9s applicatives li\u00e9es \u00e0 la gestion des limites de m\u00e9moire\".","author":"Delalleau G.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455775"},{"volume-title":"ToorCon 9","year":"2007","author":"Goodspeed T.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"StackShield.  StackShield."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"volume-title":"Usenix security","year":"2009","author":"Ralf Hund F. F.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1113830.1113833"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_18_1","unstructured":"I. C. Society. Wireless medium access control (mac) and physical layer (phy) specifications for low-rate wireless personal area networks (wpans). http:\/\/standards.ieee.org\/getieee802\/download\/802.15.4-2006.pdf.  I. C. Society. Wireless medium access control (mac) and physical layer (phy) specifications for low-rate wireless personal area networks (wpans). http:\/\/standards.ieee.org\/getieee802\/download\/802.15.4-2006.pdf."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"e_1_3_2_1_20_1","unstructured":"The PaX Team. Pax address space layout randomization (aslr). http:\/\/pax.grsecurity.net\/docs\/aslr.txt.  The PaX Team. Pax address space layout randomization (aslr). http:\/\/pax.grsecurity.net\/docs\/aslr.txt."},{"key":"e_1_3_2_1_21_1","unstructured":"The PaX Team. Pax 2003. http:\/\/pax.grsecurity.net.  The PaX Team. Pax 2003. http:\/\/pax.grsecurity.net."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147768"},{"key":"e_1_3_2_1_23_1","unstructured":"Undisclosed Authors. Revisiting code attestation in embedded systems. In under submission 2009.  Undisclosed Authors. Revisiting code attestation in embedded systems. In under submission 2009."},{"key":"e_1_3_2_1_24_1","first-page":"11","author":"White Paper S. D. VITO.","year":"2008","journal-title":"Secure Microcontrollers for Secure Systems. ATMEL"},{"key":"e_1_3_2_1_25_1","unstructured":"J. Xu Z. Kalbarczyk S. Patel and R. Iyer. Architecture support for defending against buffer overflow attacks 2002.  J. Xu Z. Kalbarczyk S. Patel and R. Iyer. Architecture support for defending against buffer overflow attacks 2002."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542452.1542461"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.27"}],"event":{"name":"CCS '09: 16th ACM Conference on Computer and Communications Security 2009","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '09"},"container-title":["Proceedings of the first ACM workshop on Secure execution of untrusted code"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655077.1655083","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655077.1655083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:31Z","timestamp":1750250731000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655077.1655083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,9]]},"references-count":27,"alternative-id":["10.1145\/1655077.1655083","10.1145\/1655077"],"URL":"https:\/\/doi.org\/10.1145\/1655077.1655083","relation":{},"subject":[],"published":{"date-parts":[[2009,11,9]]},"assertion":[{"value":"2009-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}