{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:37Z","timestamp":1763468257436,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,14]],"date-time":"2015-06-14T00:00:00Z","timestamp":1434240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation of Korea(NRF) grant funded by the Korea government (MSIP)","award":["2014R1A2A1A10051792"],"award-info":[{"award-number":["2014R1A2A1A10051792"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,14]]},"DOI":"10.1145\/2768566.2768569","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Towards a practical solution to detect code reuse attacks on ARM mobile devices"],"prefix":"10.1145","author":[{"given":"Yongje","family":"Lee","sequence":"first","affiliation":[{"name":"Seoul National University, Korea"}]},{"given":"Ingoo","family":"Heo","sequence":"additional","affiliation":[{"name":"Seoul National University, Korea"}]},{"given":"Dongil","family":"Hwang","sequence":"additional","affiliation":[{"name":"Seoul National University, Korea"}]},{"given":"Kyungmin","family":"Kim","sequence":"additional","affiliation":[{"name":"Seoul National University, Korea"}]},{"given":"Yunheung","family":"Paek","sequence":"additional","affiliation":[{"name":"Seoul National University, Korea"}]}],"member":"320","published-online":{"date-parts":[[2015,6,14]]},"reference":[{"volume-title":"Data execution prevention. changes to functionality in microsoft windows xp service pack 2, part 3: Memory protection technologies","year":"2004","author":"Andersen S.","key":"e_1_3_2_1_1_1"},{"volume-title":"CoreSight Program Flow Trace Architecture Specification","year":"2011","author":"ARM","key":"e_1_3_2_1_2_1"},{"volume-title":"Procedure call standard for the arm architecture","year":"2012","author":"ARM","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","first-page":"0","volume":"2","author":"ARM","year":"2013","journal-title":"LTD. ARM CoreSight Architecture Specification"},{"volume-title":"ARM System Memory Management Unit Architecture Specification","year":"2013","author":"ARM","key":"e_1_3_2_1_5_1"},{"volume-title":"AMBA Network Interconnect (NIC-301) Technical Reference Manual","year":"2014","author":"ARM","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"ARM co. LTD. Cortex-A9 Processor 2014.  ARM co. LTD. Cortex-A9 Processor 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10772-6_13"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2596656"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966920"},{"volume-title":"ZC702 Board. ZC702 evaluation board features. ZC702 Evaluation Board for the Zynq-7000 XC7Z020 Extensible Processing Platform","year":"2012","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2010.10.002"},{"volume-title":"IPhone 4S officially announced by Apple","year":"2011","author":"Gaikar V.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1128020.1128563"},{"key":"e_1_3_2_1_16_1","first-page":"94","volume-title":"International Symposium on","author":"Kayaalp M.","year":"2012"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2013.6522324"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755753.2755786"},{"volume-title":"Format string attacks","year":"2000","author":"Newsham T.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"NVIDIA Corporation. Tegra 2015.  NVIDIA Corporation. Tegra 2015."},{"volume-title":"Evaluation of the energy efficiency of arm based processors for cloud infrastructure","year":"2010","author":"Olle S.-W.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.166"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534805"},{"volume-title":"Address Space Layout Randomization","year":"2003","author":"Team X","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315260"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2012.02.013"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Qualcomm Technologies Inc. Snapdragon 2015.  Qualcomm Technologies Inc. Snapdragon 2015.","DOI":"10.1016\/S1365-6937(15)30249-5"},{"journal-title":"LTD. Exynos","first-page":"4","year":"2012","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"Samsung Electronics co. LTD. Exynos 2015.  Samsung Electronics co. LTD. Exynos 2015."},{"volume-title":"Analysis of the jailbreakme v3 font exploit","year":"2012","author":"Sogeti E.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_32_1","unstructured":"The shell storm linux shellcode repository 2014.  The shell storm linux shellcode repository 2014."},{"key":"e_1_3_2_1_33_1","first-page":"813","volume-title":"Proceedings of the 23rd USENIX conference on Security Symposium","author":"Vogl S.","year":"2014"}],"event":{"name":"ISCA '15: The 42nd Annual International Symposium on Computer Architecture","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Portland Oregon","acronym":"ISCA '15"},"container-title":["Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2768566.2768569","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2768566.2768569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:28Z","timestamp":1750227148000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2768566.2768569"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,14]]},"references-count":33,"alternative-id":["10.1145\/2768566.2768569","10.1145\/2768566"],"URL":"https:\/\/doi.org\/10.1145\/2768566.2768569","relation":{},"subject":[],"published":{"date-parts":[[2015,6,14]]},"assertion":[{"value":"2015-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}