{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:16Z","timestamp":1750220956598,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T00:00:00Z","timestamp":1561161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1740352, 1730309, 1717779, 1563935, 1350690"],"award-info":[{"award-number":["1740352, 1730309, 1717779, 1563935, 1350690"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,22]]},"DOI":"10.1145\/3307650.3322256","type":"proceedings-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T12:42:33Z","timestamp":1560516153000},"page":"711-722","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Bouncer"],"prefix":"10.1145","author":[{"given":"Joseph","family":"McMahan","sequence":"first","affiliation":[{"name":"UC Santa Barbara"}]},{"given":"Michael","family":"Christensen","sequence":"additional","affiliation":[{"name":"UC Santa Barbara"}]},{"given":"Kyle","family":"Dewey","sequence":"additional","affiliation":[{"name":"CSU Northridge"}]},{"given":"Ben","family":"Hardekopf","sequence":"additional","affiliation":[{"name":"UC Santa Barbara"}]},{"given":"Timothy","family":"Sherwood","sequence":"additional","affiliation":[{"name":"UC Santa Barbara"}]}],"member":"320","published-online":{"date-parts":[[2019,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984004"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535839"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31985-6_19"},{"key":"e_1_3_2_1_4_1","unstructured":"Erik Buchanan Ryan Roemer and Stefan Savage. {n. d.}. Return-Oriented Programming: Exploits Without Code Injection. https:\/\/hovav.net\/ucsd\/talks\/blackhat08.html. ({n. d.})."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896499"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/518247"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3123955"},{"key":"e_1_3_2_1_8_1","unstructured":"Wouter Coekaerts. {n. d.}. The Java Typesystem is Broken. http:\/\/wouter.coekaerts.be\/2018\/java-type-system-broken. ({n. d.})."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/604131.604149"},{"volume-title":"1999 ACM SIGPLAN Workshop on Compiler Support for System Software Atlanta, GA, USA. 25--35","author":"Crary K.","key":"e_1_3_2_1_10_1","unstructured":"K. Crary, Neal Glew, Dan Grossman, Richard Samuels, F. Smith, D. Walker, S. Weirich, and S. Zdancewic. 1999. TALx86: A realistic typed assembly language. In 1999 ACM SIGPLAN Workshop on Compiler Support for System Software Atlanta, GA, USA. 25--35. http:\/\/www.cis.upenn.edu\/~stevez\/papers\/MCGG99.pdf"},{"volume-title":"When Firmware Modification Attack: A Case Study of Embedded Exploitation. In NDSS Symposium '13","author":"Cui Ang","key":"e_1_3_2_1_11_1","unstructured":"Ang Cui, Michael Costello, and Salvatore J. Stolfo. 2013. When Firmware Modification Attack: A Case Study of Embedded Exploitation. In NDSS Symposium '13."},{"key":"e_1_3_2_1_12_1","unstructured":"Zach Cutlip. 2013. Dlink DIR-815 UPnP Command Injection. http:\/\/shadow-file.blogspot.com\/2013\/02\/dlink-dir-815-upnp-command-injection.html. (February 2013). {Online; accessed 01-November-2017}."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346295"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.65"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009871"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1128020.1128563"},{"key":"e_1_3_2_1_18_1","unstructured":"Grant Hernandez Orlando Arias Daniel Buentello and Yier Jin. 2014. Smart Nest Thermostat: A Smart Spy in Your Home In Black Hat Briefings. Black Hat Briefings."},{"key":"e_1_3_2_1_19_1","volume-title":"In Proceedings of the Network and Distributed System Security Symposium.","author":"Lee Jonghyup","year":"2011","unstructured":"Jonghyup Lee, Thanassis Avgerinos, and David Brumley. 2011. TIE: Principled reverse engineering of types in binary programs. In In Proceedings of the Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037733"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796801004178"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/319301.319345"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337181"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908119"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033027"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/507635.507657"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2830840.2830850"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037734"}],"event":{"name":"ISCA '19: The 46th Annual International Symposium on Computer Architecture","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE-CS\\DATC IEEE Computer Society"],"location":"Phoenix Arizona","acronym":"ISCA '19"},"container-title":["Proceedings of the 46th International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3307650.3322256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3307650.3322256","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3307650.3322256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:06Z","timestamp":1750204446000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3307650.3322256"}},"subtitle":["static program analysis in hardware"],"short-title":[],"issued":{"date-parts":[[2019,6,22]]},"references-count":29,"alternative-id":["10.1145\/3307650.3322256","10.1145\/3307650"],"URL":"https:\/\/doi.org\/10.1145\/3307650.3322256","relation":{},"subject":[],"published":{"date-parts":[[2019,6,22]]},"assertion":[{"value":"2019-06-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}