{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:23:51Z","timestamp":1751091831857,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T00:00:00Z","timestamp":1610928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,18]]},"DOI":"10.1145\/3441110.3441146","type":"proceedings-article","created":{"date-parts":[[2021,2,2]],"date-time":"2021-02-02T00:35:26Z","timestamp":1612226126000},"page":"26-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["DExIE - An IoT-Class Hardware Monitor for Real-Time Fine-Grained Control-Flow Integrity"],"prefix":"10.1145","author":[{"given":"Christoph","family":"Spang","sequence":"first","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Yannick","family":"Lavan","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Marco","family":"Hartmann","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Florian","family":"Meisel","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Andreas","family":"Koch","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,2]]},"reference":[{"key":"#cr-split#-e_1_3_2_1_1_1.1","doi-asserted-by":"crossref","unstructured":"Tyler Bletsch Xuxian Jiang Vincent Freeh and Zhenkai Liang. 2011. Jump-oriented programming: a new class of code-reuse attack.30-40. https:\/\/doi.org\/10.1145\/1966913.1966919 10.1145\/1966913.1966919","DOI":"10.1145\/1966913.1966919"},{"key":"#cr-split#-e_1_3_2_1_1_1.2","doi-asserted-by":"crossref","unstructured":"Tyler Bletsch Xuxian Jiang Vincent Freeh and Zhenkai Liang. 2011. Jump-oriented programming: a new class of code-reuse attack.30-40. https:\/\/doi.org\/10.1145\/1966913.1966919","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397360"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2548561"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966920"},{"key":"e_1_3_2_1_5_1","unstructured":"Div.2019. Embench-Iot Github Repository. https:\/\/github.com\/embench\/embench-iot  Div.2019. Embench-Iot Github Repository. https:\/\/github.com\/embench\/embench-iot"},{"key":"e_1_3_2_1_6_1","unstructured":"Div.2020. Capstone The Ultimate Disassembly Framework. http:\/\/www.capstone-engine.org\/  Div.2020. Capstone The Ultimate Disassembly Framework. http:\/\/www.capstone-engine.org\/"},{"key":"e_1_3_2_1_7_1","unstructured":"Div.2020. Contiki-NG: The OS for Next Generation IoT Devices. https:\/\/github.com\/contiki-ng\/contiki-ngf  Div.2020. Contiki-NG: The OS for Next Generation IoT Devices. https:\/\/github.com\/contiki-ng\/contiki-ngf"},{"key":"e_1_3_2_1_8_1","unstructured":"Div.2020. RISC-V Debug Specification. https:\/\/github.com\/riscv\/riscv-debug-spec  Div.2020. RISC-V Debug Specification. https:\/\/github.com\/riscv\/riscv-debug-spec"},{"key":"e_1_3_2_1_9_1","unstructured":"Div.2020. RISC-V Formal Verification Framework. https:\/\/github.com\/SymbioticEDA\/riscv-formal  Div.2020. RISC-V Formal Verification Framework. https:\/\/github.com\/SymbioticEDA\/riscv-formal"},{"key":"e_1_3_2_1_10_1","unstructured":"Div.2020. RISC-V Trace Specification. https:\/\/github.com\/riscv\/riscv-trace-spec  Div.2020. RISC-V Trace Specification. https:\/\/github.com\/riscv\/riscv-trace-spec"},{"key":"e_1_3_2_1_11_1","unstructured":"Div.2020. Spike RISC-V ISA Simulator. https:\/\/github.com\/riscv\/riscv-isa-sim  Div.2020. Spike RISC-V ISA Simulator. https:\/\/github.com\/riscv\/riscv-isa-sim"},{"volume-title":"Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation","author":"Chen","key":"e_1_3_2_1_12_1","unstructured":"Chen et al.2019. Automated Finite State Machine Extraction . In Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation ( London, United Kingdom) (FEAST\u201919). Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3338502.3359760 10.1145\/3338502.3359760 Chen et al.2019. Automated Finite State Machine Extraction. In Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation (London, United Kingdom) (FEAST\u201919). Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3338502.3359760"},{"volume-title":"Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","author":"Evans","key":"e_1_3_2_1_13_1","unstructured":"Evans et al.2015. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security ( Denver, Colorado, USA) (CCS \u201915). Association for Computing Machinery, New York, NY, USA, 901\u2013913. https:\/\/doi.org\/10.1145\/2810103.2813646 10.1145\/2810103.2813646 Evans et al.2015. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (Denver, Colorado, USA) (CCS \u201915). Association for Computing Machinery, New York, NY, USA, 901\u2013913. https:\/\/doi.org\/10.1145\/2810103.2813646"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig48160.2019.8994796"},{"volume-title":"Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. In 2016 IEEE Symposium on Security and Privacy (SP). 969\u2013986","author":"Hu H.","key":"e_1_3_2_1_15_1","unstructured":"H. Hu , S. Shinde , S. Adrian , Z.\u00a0 L. Chua , P. Saxena , and Z. Liang . 2016 . Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. In 2016 IEEE Symposium on Security and Privacy (SP). 969\u2013986 . H. Hu, S. Shinde, S. Adrian, Z.\u00a0L. Chua, P. Saxena, and Z. Liang. 2016. Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. In 2016 IEEE Symposium on Security and Privacy (SP). 969\u2013986."},{"key":"e_1_3_2_1_16_1","unstructured":"Rev. 2020 3 0 Control-flow Enforcement Technology Specification"},{"volume-title":"Applied Reconfigurable Computing","author":"Korinth Jens","key":"e_1_3_2_1_17_1","unstructured":"Jens Korinth , Jaco Hofmann , Carsten Heinz , and Andreas Koch . 2019. The TaPaSCo Open-Source Toolflow for the Automated Composition of Task-Based Parallel Reconfigurable Computing Systems . In Applied Reconfigurable Computing . Springer International Publishing , Cham , 214\u2013229. Jens Korinth, Jaco Hofmann, Carsten Heinz, and Andreas Koch. 2019. The TaPaSCo Open-Source Toolflow for the Automated Composition of Task-Based Parallel Reconfigurable Computing Systems. In Applied Reconfigurable Computing. Springer International Publishing, Cham, 214\u2013229."},{"key":"e_1_3_2_1_18_1","volume-title":"Zipper Stack: Shadow Stacks Without Shadow. ArXiv","author":"Li Jinfeng","year":"2019","unstructured":"Jinfeng Li , Liwei Chen , Qizhen Xu , 2019 . Zipper Stack: Shadow Stacks Without Shadow. ArXiv (2019). Jinfeng Li, Liwei Chen, Qizhen Xu, 2019. Zipper Stack: Shadow Stacks Without Shadow. ArXiv (2019)."},{"key":"#cr-split#-e_1_3_2_1_19_1.1","doi-asserted-by":"crossref","unstructured":"Yang LI and Jun-wei LI. 2018. A Technique Preventing Code Reuse Attacks Based on RISC Processor. DEStech Transactions on Computer Science and Engineering (08 2018). https:\/\/doi.org\/10.12783\/dtcse\/CCNT2018\/24682 10.12783\/dtcse","DOI":"10.12783\/dtcse\/CCNT2018\/24682"},{"key":"#cr-split#-e_1_3_2_1_19_1.2","doi-asserted-by":"crossref","unstructured":"Yang LI and Jun-wei LI. 2018. A Technique Preventing Code Reuse Attacks Based on RISC Processor. DEStech Transactions on Computer Science and Engineering (08 2018). https:\/\/doi.org\/10.12783\/dtcse\/CCNT2018\/24682","DOI":"10.12783\/dtcse\/CCNT2018\/24682"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.166"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2019.8905120"},{"key":"e_1_3_2_1_22_1","unstructured":"Qualcomm. 2017. Pointer Authentication. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointer-authentication-on-armv8-3.pdf  Qualcomm. 2017. Pointer Authentication. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointer-authentication-on-armv8-3.pdf"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2012.2218630"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"volume-title":"2017 IEEE International Symposium on Technologies for Homeland Security (HST). 1\u20135.","author":"Sullivan T.","key":"e_1_3_2_1_25_1","unstructured":"G.\u00a0 T. Sullivan , A. DeHon , S. Milburn , E. Boling , M. Ciaffi , J. Rosenberg , and A. Sutherland . 2017. The Dover inherently secure processor . In 2017 IEEE International Symposium on Technologies for Homeland Security (HST). 1\u20135. G.\u00a0T. Sullivan, A. DeHon, S. Milburn, E. Boling, M. Ciaffi, J. Rosenberg, and A. Sutherland. 2017. The Dover inherently secure processor. In 2017 IEEE International Symposium on Technologies for Homeland Security (HST). 1\u20135."},{"key":"e_1_3_2_1_26_1","volume-title":"Advances in Computer Science - ASIAN","author":"Xia Nai","year":"2006","unstructured":"Nai Xia , Bing Mao , Qingkai Zeng , and Li Xie . 2007. Efficient and Practical Control Flow Monitoring for Program Security . In Advances in Computer Science - ASIAN 2006 . Secure Software and Related Issues, Mitsu Okada and Ichiro Satoh (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 90\u2013104. Nai Xia, Bing Mao, Qingkai Zeng, and Li Xie. 2007. Efficient and Practical Control Flow Monitoring for Program Security. In Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, Mitsu Okada and Ichiro Satoh (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 90\u2013104."},{"volume-title":"Research in Attacks","author":"Yuan Pinghai","key":"e_1_3_2_1_27_1","unstructured":"Pinghai Yuan , Qingkai Zeng , and Xuhua Ding . 2015. Hardware-Assisted Fine-Grained Code-Reuse Attack Detection . In Research in Attacks , Intrusions, and Defenses, Herbert Bos, Fabian Monrose, and Gregory Blanc(Eds.). Springer International Publishing , Cham , 66\u201385. Pinghai Yuan, Qingkai Zeng, and Xuhua Ding. 2015. Hardware-Assisted Fine-Grained Code-Reuse Attack Detection. In Research in Attacks, Intrusions, and Defenses, Herbert Bos, Fabian Monrose, and Gregory Blanc(Eds.). Springer International Publishing, Cham, 66\u201385."}],"event":{"name":"DASIP '21: Workshop on Design and Architectures for Signal and Image Processing (14th edition) - in conjunction with HiPEAC 2021","acronym":"DASIP '21","location":"Budapest Hungary"},"container-title":["Workshop on Design and Architectures for Signal and Image Processing (14th edition)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3441110.3441146","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3441110.3441146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:43Z","timestamp":1750199563000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3441110.3441146"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,18]]},"references-count":29,"alternative-id":["10.1145\/3441110.3441146","10.1145\/3441110"],"URL":"https:\/\/doi.org\/10.1145\/3441110.3441146","relation":{},"subject":[],"published":{"date-parts":[[2021,1,18]]},"assertion":[{"value":"2021-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}