{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:29Z","timestamp":1750220849598,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["732366 & 780245"],"award-info":[{"award-number":["732366 & 780245"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3357390.3361027","type":"proceedings-article","created":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T18:52:21Z","timestamp":1570733541000},"page":"131-143","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An analysis of call-site patching without strong hardware support for self-modifying-code"],"prefix":"10.1145","author":[{"given":"Tim","family":"Hartley","sequence":"first","affiliation":[{"name":"University of Manchester, UK"}]},{"given":"Foivos S.","family":"Zakkak","sequence":"additional","affiliation":[{"name":"University of Manchester, UK"}]},{"given":"Christos","family":"Kotselidis","sequence":"additional","affiliation":[{"name":"University of Manchester, UK"}]},{"given":"Mikel","family":"Luj\u00e1n","sequence":"additional","affiliation":[{"name":"University of Manchester, UK"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.391.0211"},{"volume-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, Claudio A","author":"Amarilli Antoine","key":"e_1_3_2_1_2_1","unstructured":"Antoine Amarilli , Sascha M\u00fcller , David Naccache , Daniel Page , Pablo Rauzy , and Michael Tunstall . 2011. Can Code Polymorphism Limit Information Leakage? . In Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, Claudio A . Ardagna and Jianying Zhou (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 1\u201321. Antoine Amarilli, Sascha M\u00fcller, David Naccache, Daniel Page, Pablo Rauzy, and Michael Tunstall. 2011. Can Code Polymorphism Limit Information Leakage?. In Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, Claudio A. Ardagna and Jianying Zhou (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1\u201321."},{"volume-title":"A Model for Self-Modifying Code","author":"Anckaert Bertrand","key":"e_1_3_2_1_3_1","unstructured":"Bertrand Anckaert , Matias Madou , and Koen De Bosschere . 2007. A Model for Self-Modifying Code . In Information Hiding, Jan L. Camenisch, Christian S. Collberg, Neil F. Johnson, and Phil Sallee (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 232\u2013248. Bertrand Anckaert, Matias Madou, and Koen De Bosschere. 2007. A Model for Self-Modifying Code. In Information Hiding, Jan L. Camenisch, Christian S. Collberg, Neil F. Johnson, and Phil Sallee (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 232\u2013248."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74124-4_16"},{"key":"e_1_3_2_1_5_1","unstructured":"ARM. 2019. Arm Architecture Reference Manual Armv8. https: \/\/static.docs.arm.com\/ddi0487\/ea\/DDI0487E_a_armv8_arm.pdf? _ga=2.153168888.1503102752.1563189579-1528906649.1556140495  ARM. 2019. Arm Architecture Reference Manual Armv8. https: \/\/static.docs.arm.com\/ddi0487\/ea\/DDI0487E_a_armv8_arm.pdf? _ga=2.153168888.1503102752.1563189579-1528906649.1556140495"},{"key":"e_1_3_2_1_6_1","unstructured":"ARM. 2019. Neoverse E1. https:\/\/www.arm.com\/products\/silicon-ipcpu\/neoverse\/neoverse-e1  ARM. 2019. Neoverse E1. https:\/\/www.arm.com\/products\/silicon-ipcpu\/neoverse\/neoverse-e1"},{"key":"e_1_3_2_1_7_1","unstructured":"Azul Systems. 2019. Zulu Embedded Open Source Java for Embedded Systems. https:\/\/www.azul.com\/products\/zulu-embedded\/  Azul Systems. 2019. Zulu Embedded Open Source Java for Embedded Systems. https:\/\/www.azul.com\/products\/zulu-embedded\/"},{"volume-title":"Proceedings of the 21st annual ACM SIGPLAN conference on Object-Oriented Programing, Systems, Languages, and Applications. ACM Press.","author":"Blackburn S. M.","key":"e_1_3_2_1_8_1","unstructured":"S. M. Blackburn , R. Garner , C. Hoffman , A. M. Khan , K. S. McKinley , R. Bentzur , A. Diwan , D. Feinberg , D. Frampton , S. Z. Guyer , M. Hirzel , A. Hosking , M. Jump , H. Lee , J. E. B. Moss , A. Phansalkar , D. Stefanovi\u0107 , T. VanDrunen , D. von Dincklage , and B. Wiedermann . 2006. The DaCapo Benchmarks: Java Benchmarking Development and Analysis. In OOPSLA \u201906 : Proceedings of the 21st annual ACM SIGPLAN conference on Object-Oriented Programing, Systems, Languages, and Applications. ACM Press. S. M. Blackburn, R. Garner, C. Hoffman, A. M. Khan, K. S. McKinley, R. Bentzur, A. Diwan, D. Feinberg, D. Frampton, S. Z. Guyer, M. Hirzel, A. Hosking, M. Jump, H. Lee, J. E. B. Moss, A. Phansalkar, D. Stefanovi\u0107, T. VanDrunen, D. von Dincklage, and B. Wiedermann. 2006. The DaCapo Benchmarks: Java Benchmarking Development and Analysis. In OOPSLA \u201906: Proceedings of the 21st annual ACM SIGPLAN conference on Object-Oriented Programing, Systems, Languages, and Applications. ACM Press."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250743"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192975.3193016"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329819"},{"key":"e_1_3_2_1_12_1","unstructured":"RISC-V Foundation. 2019. The RISC-V Instruction Set Manual Volume I: User-Level ISA Document Version 20190608-Base-Ratified. https: \/\/riscv.org\/specifications\/  RISC-V Foundation. 2019. The RISC-V Instruction Set Manual Volume I: User-Level ISA Document Version 20190608-Base-Ratified. https: \/\/riscv.org\/specifications\/"},{"key":"e_1_3_2_1_13_1","volume-title":"Haley and Andrew Dinn. FOSDEM 2014","author":"Andrew","year":"2014","unstructured":"Andrew Haley and Andrew Dinn. FOSDEM 2014 . OpenJDK on AArch64 Update. https:\/\/aph.fedorapeople.org\/Aarch64-fosdem 2014 .pdf Andrew Haley and Andrew Dinn. FOSDEM 2014. OpenJDK on AArch64 Update. https:\/\/aph.fedorapeople.org\/Aarch64-fosdem2014.pdf"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516675"},{"key":"e_1_3_2_1_15_1","unstructured":"IBM. 2017. Power ISA Version 3.0B. https:\/\/openpowerfoundation. org\/?resource_lib=power-isa-version-3-0  IBM. 2017. Power ISA Version 3.0B. https:\/\/openpowerfoundation. org\/?resource_lib=power-isa-version-3-0"},{"key":"e_1_3_2_1_16_1","unstructured":"Intel. 2015. Method and apparatus for providing hardware support for self-modifying code PCT\/US2015\/030411. https:\/\/patents.google. com\/patent\/EP3143496A1\/en  Intel. 2015. Method and apparatus for providing hardware support for self-modifying code PCT\/US2015\/030411. https:\/\/patents.google. com\/patent\/EP3143496A1\/en"},{"volume-title":"Intel 64 and IA-32 Architectures Software Developer\u2019s Manual","key":"e_1_3_2_1_17_1","unstructured":"Intelm. 2019. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual , Volume 2 . https:\/\/www.intel.com\/content\/dam\/www\/ public\/us\/en\/documents\/manuals\/64-ia-32-architectures-softwaredeveloper-instruction-set-reference-manual-325383.pdf Intelm. 2019. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual, Volume 2. https:\/\/www.intel.com\/content\/dam\/www\/ public\/us\/en\/documents\/manuals\/64-ia-32-architectures-softwaredeveloper-instruction-set-reference-manual-325383.pdf"},{"key":"e_1_3_2_1_18_1","unstructured":"JamaicaVM. 2019. A hard realtime Java bytecode-based Virtual Machine. https:\/\/www.aicas.com\/cms\/en\/JamaicaVM  JamaicaVM. 2019. A hard realtime Java bytecode-based Virtual Machine. https:\/\/www.aicas.com\/cms\/en\/JamaicaVM"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050748.3050764"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14778\/2752939.2752945"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.007"},{"key":"e_1_3_2_1_22_1","unstructured":"MicroPython. 2019. Python for microcontrollers. https:\/\/micropython. org  MicroPython. 2019. Python for microcontrollers. https:\/\/micropython. org"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706313"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2013.01.002"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465529.2465553"},{"key":"e_1_3_2_1_27_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT","author":"Veyrat-Charvillon Nicolas","year":"2012","unstructured":"Nicolas Veyrat-Charvillon , Marcel Medwed , St\u00e9phanie Kerckhof , and Fran\u00e7ois-Xavier Standaert . 2012. Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note . In Advances in Cryptology \u2013 ASIACRYPT 2012 , Xiaoyun Wang and Kazue Sako (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 740\u2013757. Nicolas Veyrat-Charvillon, Marcel Medwed, St\u00e9phanie Kerckhof, and Fran\u00e7ois-Xavier Standaert. 2012. Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note. In Advances in Cryptology \u2013 ASIACRYPT 2012, Xiaoyun Wang and Kazue Sako (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 740\u2013757."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2400682.2400689"}],"event":{"name":"MPLR '19: 16th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Athens Greece","acronym":"MPLR '19"},"container-title":["Proceedings of the 16th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357390.3361027","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357390.3361027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:11Z","timestamp":1750202591000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357390.3361027"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":28,"alternative-id":["10.1145\/3357390.3361027","10.1145\/3357390"],"URL":"https:\/\/doi.org\/10.1145\/3357390.3361027","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}