{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T17:43:59Z","timestamp":1767894239373,"version":"3.49.0"},"reference-count":98,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,7,31]],"date-time":"2022-07-31T00:00:00Z","timestamp":1659225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["2038726"],"award-info":[{"award-number":["2038726"]}]},{"name":"Commonwealth Cyber Initiative"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2022,7,31]]},"abstract":"<jats:p>Computing systems, including real-time embedded systems, are becoming increasingly connected to allow for more advanced and safer operation. Such embedded systems are also often resource-constrained, for example, with lower processing capabilities compared to general-purpose computing systems like desktops or servers. With the advent of paradigms such as internet-of-things (IoT), embedded systems in both commercial and industrial contexts are being increasingly interconnected and exposed to the external networks to improve automation and efficiency of operation. However, allowing external interfaces to such embedded systems increases their exposure to attackers. With an increase in attacks against embedded systems ranging from home appliances to industrial control systems operating critical equipment that have real-time requirements, it is imperative that defense mechanisms be created that explicitly consider such resource and real-time constraints. Control-flow integrity (CFI) is a family of defense mechanisms that prevent attackers from modifying the flow of execution. We survey CFI techniques, ranging from the basic to state of the art, that are built for embedded systems and real-time embedded systems and find that there is a dearth, especially for real-time embedded systems, of CFI mechanisms. We then present open challenges to the community to help drive future research in this domain.<\/jats:p>","DOI":"10.1145\/3538275","type":"journal-article","created":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T12:16:56Z","timestamp":1658146616000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Survey of Control-flow Integrity Techniques for Real-time Embedded Systems"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9956-2956","authenticated-orcid":false,"given":"Tanmaya","family":"Mishra","sequence":"first","affiliation":[{"name":"Virginia Polytechnic Institute and State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5688-5720","authenticated-orcid":false,"given":"Thidapat","family":"Chantem","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0876-1181","authenticated-orcid":false,"given":"Ryan","family":"Gerdes","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,10,4]]},"reference":[{"key":"e_1_3_1_2_2","volume-title":"Clang 12 Documentation","year":"2020","unstructured":"Clang 12 Documentation. 2020. Retrieved October 24, 2020, from https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrity.html."},{"key":"e_1_3_1_3_2","unstructured":"Standard Performance Evaluation Corporation. 2020. https:\/\/www.spec.org\/benchmarks.html."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/CPSNA.2013.6614242"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134618"},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","unstructured":"N. S. Almakhdhub Abraham A. Clements S. Bagchi and M. Payer. 2020. \u00b5RAI: Securing Embedded Systems with Return Address Integrity. In 2020 Network and Distributed Systems Security (NDSS) Symposium .","DOI":"10.14722\/ndss.2020.24016"},{"key":"e_1_3_1_8_2","volume-title":"2019 IEEE Real-Time Systems Symposium (RTSS\u201919)","author":"Anwar Fatima M.","year":"2019","unstructured":"Fatima M. Anwar, Luis Garcia, Xi Han, and Mani Srivastava. 2019. Securing time in untrusted operating systems with TimeSeal. In 2019 IEEE Real-Time Systems Symposium (RTSS\u201919)."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342161"},{"key":"e_1_3_1_11_2","unstructured":"Richard Barry et\u00a0al. 2008. FreeRTOS. https:\/\/www.embeddedrelated.com\/Documents\/190225_FreeRTOS_Embedded_World.pdf."},{"key":"e_1_3_1_12_2","first-page":"1","volume-title":"32nd Euromicro Conference on Real-time Systems (ECRTS\u201920)","author":"Bellec Nicolas","year":"2020","unstructured":"Nicolas Bellec, Simon Rokicki, and Isabelle Puaut. 2020. Attack detection through monitoring of timing deviations in embedded real-time systems. In 32nd Euromicro Conference on Real-time Systems (ECRTS\u201920). 1\u201322."},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076783"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"e_1_3_1_16_2","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1109\/SP.2019.00076","volume-title":"2019 IEEE Symposium on Security and Privacy (SP\u201919)","author":"Burow Nathan","year":"2019","unstructured":"Nathan Burow, Xinping Zhang, and Mathias Payer. 2019. SoK: Shining light on shadow stacks. In 2019 IEEE Symposium on Security and Privacy (SP\u201919). IEEE, 985\u2013999."},{"key":"e_1_3_1_17_2","first-page":"161","volume-title":"24th USENIX Security Symposium (USENIX Security\u201915)","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R. Gross. 2015. Control-flow bending: On the effectiveness of control-flow integrity. In 24th USENIX Security Symposium (USENIX Security\u201915). USENIX Association, Washington, D.C., 161\u2013176. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/carlini."},{"key":"e_1_3_1_18_2","first-page":"385","volume-title":"23rd  \\( \\lbrace \\) USENIX \\( \\rbrace \\)  Security Symposium ( \\( \\lbrace \\) USENIX \\( \\rbrace \\)  Security\u201914)","author":"Carlini Nicholas","year":"2014","unstructured":"Nicholas Carlini and David Wagner. 2014. \\( \\lbrace \\) ROP \\( \\rbrace \\) is still dangerous: Breaking modern defenses. In 23rd \\( \\lbrace \\) USENIX \\( \\rbrace \\) Security Symposium ( \\( \\lbrace \\) USENIX \\( \\rbrace \\) Security\u201914). 385\u2013399."},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_1_20_2","volume-title":"USENIX Security Symposium","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, et\u00a0al. 2011. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium."},{"key":"e_1_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Yueqiang Cheng Zongwei Zhou Yu Miao Xuhua Ding and Robert H. Deng. 2014. ROPecker: A generic and practical approach for defending against ROP attack. In 2014 Network and Distributed Systems Security (NDSS) Symposium Vol. 26. 1\u201314.","DOI":"10.14722\/ndss.2014.23156"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857722"},{"key":"e_1_3_1_23_2","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/SP.2017.37","volume-title":"2017 IEEE Symposium on Security and Privacy (SP\u201917)","author":"Clements Abraham A.","year":"2017","unstructured":"Abraham A. Clements, Naif Saleh Almakhdhub, Khaled S. Saab, Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, and Mathias Payer. 2017. Protecting bare-metal embedded systems with privilege overlays. In 2017 IEEE Symposium on Security and Privacy (SP\u201917). IEEE, 289\u2013303."},{"key":"e_1_3_1_24_2","unstructured":"EEMBC The Embedded Microprocessor Benchmark Consortium et\u00a0al. 2015. CoreMark-Pro. https:\/\/www.eembc.org\/coremark-pro."},{"key":"e_1_3_1_25_2","first-page":"63","volume-title":"USENIX Security Symposium","author":"Cowan Crispan","year":"1998","unstructured":"Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, and Heather Hinton. 1998. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX Security Symposium, Vol. 98. San Antonio, TX, 63\u201378."},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.52"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/0168-9002(94)91493-1"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2548561"},{"key":"e_1_3_1_30_2","volume-title":"Return-oriented Programming without Returns on ARM","author":"Davi Lucas","year":"2010","unstructured":"Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, and Marcel Winandy. 2010. Return-oriented Programming without Returns on ARM. Technical Report. Technical Report HGI-TR-2010-002, Ruhr-University Bochum."},{"key":"e_1_3_1_31_2","first-page":"401","volume-title":"23rd USENIX Security Symposium (USENIX Security\u201914)","author":"Davi Lucas","year":"2014","unstructured":"Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, and Fabian Monrose. 2014. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In 23rd USENIX Security Symposium (USENIX Security\u201914). USENIX Association, San Diego, CA, 401\u2013416. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/davi."},{"key":"e_1_3_1_32_2","article-title":"A survey of hardware-based control flow integrity (CFI)","author":"Clercq Ruan de","year":"2017","unstructured":"Ruan de Clercq and Ingrid Verbauwhede. 2017. A survey of hardware-based control flow integrity (CFI). arXiv preprint arXiv:1706.07257 (2017).","journal-title":"arXiv preprint arXiv:1706.07257"},{"key":"e_1_3_1_33_2","unstructured":"Yufei Du Zhuojia Shen Komail Dharsee Jie Zhou Robert J. Walls and John Criswell. 2021. Holistic control-flow protection on real-time embedded systems with Kage."},{"key":"e_1_3_1_34_2","unstructured":"R. Earnshaw. 2005. ARM Procedure Call Standard for the ARM Architecture."},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.anucene.2013.05.016"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"issue":"6","key":"e_1_3_1_37_2","first-page":"29","article-title":"W32. stuxnet dossier","volume":"5","author":"Falliere Nicolas","year":"2011","unstructured":"Nicolas Falliere, Liam O. Murchu, and Eric Chien. 2011. W32. stuxnet dossier. White paper, Symantec Corp., Security Response 5, 6 (2011), 29.","journal-title":"White paper, Symantec Corp., Security Response"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359834"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455775"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134037"},{"key":"e_1_3_1_41_2","article-title":"The LEON processor user\u2019s manual","volume":"2","author":"Gaisler Jiri","year":"2001","unstructured":"Jiri Gaisler et\u00a0al. 2001. The LEON processor user\u2019s manual. Gaisler Research 2 (2001).","journal-title":"Gaisler Research"},{"key":"e_1_3_1_42_2","article-title":"Exploring coremark a benchmark maximizing simplicity and efficacy","author":"Gal-On Shay","year":"2012","unstructured":"Shay Gal-On and Markus Levy. 2012. Exploring coremark a benchmark maximizing simplicity and efficacy. In The Embedded Microprocessor Benchmark Consortium.","journal-title":"The Embedded Microprocessor Benchmark Consortium"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxq009"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2014.2301752"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD46524.2019.00037"},{"key":"e_1_3_1_47_2","volume-title":"29th Euromicro Conference on Real-Time Systems (ECRTS\u201917)","author":"Hasan Monowar","year":"2017","unstructured":"Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni, and Rakesh B. Bobba. 2017. Contego: An adaptive framework for integrating security tasks in real-time systems. In 29th Euromicro Conference on Real-Time Systems (ECRTS\u201917). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342007"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3371151"},{"key":"e_1_3_1_50_2","unstructured":"ARM Holdings. [n.d.]. ARMv7-M Architecture Reference Manual December 2014. https:\/\/developer.arm.com\/documentation\/ddi0403\/latest\/."},{"key":"e_1_3_1_51_2","first-page":"969","volume-title":"2016 IEEE Symposium on Security and Privacy (SP\u201916)","author":"Hu Hong","year":"2016","unstructured":"Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang. 2016. Data-oriented programming: On the expressiveness of non-control data attacks. In 2016 IEEE Symposium on Security and Privacy (SP\u201916). IEEE, 969\u2013986."},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1134764"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2012.6223219"},{"key":"e_1_3_1_54_2","unstructured":"Intel. [n.d.]. A Technical Look at Intel\u2019s Control-flow Enforcement Technology. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/technical-look-control-flow-enforcement-technology.html."},{"key":"e_1_3_1_55_2","doi-asserted-by":"crossref","unstructured":"Tomoaki Kawada Shinya Honda Yutaka Matsubara and Hiroaki Takada. 2020. TZmCFI: RTOS-Aware Control-Flow Integrity Using TrustZone for Armv8-M. International Journal of Parallel Programming 49 (2020) 1\u201321.","DOI":"10.1007\/s10766-020-00673-z"},{"key":"e_1_3_1_56_2","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/ICCPS.2012.14","volume-title":"2012 IEEE\/ACM Third International Conference on Cyber-Physical Systems","author":"Kim Junsung","year":"2012","unstructured":"Junsung Kim, Karthik Lakshmanan, and Ragunathan Rajkumar. 2012. Rhythmic tasks: A new task model with continually varying periods for cyber-physical systems. In 2012 IEEE\/ACM Third International Conference on Cyber-Physical Systems. IEEE, 55\u201364."},{"key":"e_1_3_1_57_2","unstructured":"Sreenath Krishnadas. 2016. Concept and Implementation of AUTOSAR compliant Automotive Ethernet stack on Infineon Aurix Tricore board. (2016). https:\/\/nbn-resolving.org\/urn:nbn:de:bsz:ch1-qucosa-212626."},{"key":"e_1_3_1_58_2","first-page":"231","volume-title":"28th  \\( \\lbrace \\) USENIX \\( \\rbrace \\)  Security Symposium ( \\( \\lbrace \\) USENIX \\( \\rbrace \\)  Security\u201919)","author":"Kwon Donghyun","year":"2019","unstructured":"Donghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, and Yunheung Paek. 2019. uXOM: Efficient eXecute-only memory on \\( \\lbrace \\) ARM \\( \\rbrace \\) Cortex-M. In 28th \\( \\lbrace \\) USENIX \\( \\rbrace \\) Security Symposium ( \\( \\lbrace \\) USENIX \\( \\rbrace \\) Security\u201919). 231\u2013247."},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39881-3_21"},{"key":"e_1_3_1_60_2","first-page":"338","volume-title":"European Symposium on Research in Computer Security","author":"Li Jinfeng","year":"2020","unstructured":"Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, and Dan Meng. 2020. Zipper stack: Shadow stacks without shadow. In European Symposium on Research in Computer Security. Springer, 338\u2013358."},{"key":"e_1_3_1_61_2","doi-asserted-by":"crossref","unstructured":"Hans Liljestrand Thomas Nyman Lachlan J. Gunn Jan-Erik Ekberg and N. Asokan. 2020. PACStack: An Authenticated Call Stack. arxiv:1905.10242 [cs.CR]","DOI":"10.1145\/3316781.3322469"},{"key":"e_1_3_1_62_2","unstructured":"Arm Ltd.2020. ARM Cortex-R. https:\/\/developer.arm.com\/ip-products\/processors\/cortex-r."},{"key":"e_1_3_1_63_2","unstructured":"Microsoft Ltd.[n.d.]. Control Flow Guard - Win32 Apps. https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/secbp\/control-flow-guard."},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098264"},{"key":"e_1_3_1_65_2","unstructured":"Stephen McCamant and Greg Morrisett. 2005. Efficient verifiable binary sandboxing for a CISC architecture. (2005). https:\/\/dspace.mit.edu\/handle\/1721.1\/30542."},{"key":"e_1_3_1_66_2","first-page":"103","volume-title":"2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS\u201919)","author":"Nasri Mitra","year":"2019","unstructured":"Mitra Nasri, Thidapat Chantem, Gedare Bloom, and Ryan M. Gerdes. 2019. On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks. In 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS\u201919). IEEE, 103\u2013116."},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100201"},{"key":"e_1_3_1_68_2","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/978-3-319-66332-6_12","volume-title":"International Symposium on Research in Attacks, Intrusions, and Defenses","author":"Nyman Thomas","year":"2017","unstructured":"Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, and N. Asokan. 2017. CFI CaRE: Hardware-supported call and return enforcement for commercial microcontrollers. In International Symposium on Research in Attacks, Intrusions, and Defenses. Springer, 259\u2013284."},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/24.994926"},{"key":"e_1_3_1_70_2","first-page":"arXiv\u20131308","article-title":"BEEBS: Open benchmarks for energy measurements on embedded platforms","author":"Pallister James","year":"2013","unstructured":"James Pallister, Simon Hollis, and Jeremy Bennett. 2013. BEEBS: Open benchmarks for energy measurements on embedded platforms. arXiv (2013), arXiv\u20131308.","journal-title":"arXiv"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3141234"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/2103621.2103678"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3301311"},{"key":"e_1_3_1_75_2","unstructured":"Gerardo Richarte et\u00a0al. 2002. Four different tricks to bypass stackshield and stackguard protection. (2002). https:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.68.3034&rep=rep1&type=pd."},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2498-z"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/2367589.2367604"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-012-9166-9"},{"key":"e_1_3_1_80_2","doi-asserted-by":"crossref","unstructured":"Dr Sarwar Sayeed Hector Marco-Gisbert Ismael Ripoll and Miriam Birch. 2019. Control-Flow Integrity: Attacks and Protections. Applied Sciences 9 20 (2019) 4229.","DOI":"10.3390\/app9204229"},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3126503"},{"key":"e_1_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254340"},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/12.477246"},{"key":"e_1_3_1_85_2","first-page":"12","volume-title":"Vulcan: Binary Transformation in a Distributed Environment","author":"Srivastava Amitabh","year":"2001","unstructured":"Amitabh Srivastava, Andrew Edwards, and Hoi Vo. 2001. Vulcan: Binary Transformation in a Distributed Environment. Technical Report MSR-TR-2001-50. 12 pages. https:\/\/www.microsoft.com\/en-us\/research\/publication\/vulcan-binary-transformation-in-a-distributed-environment\/."},{"key":"e_1_3_1_86_2","doi-asserted-by":"crossref","unstructured":"Bowen Tang Huan Ying Wei Wang and Huabin Tang. 2017. Eternal War in Software Security: A Survey of Control Flow Protection. In 2016 7th International Conference on Education Management Computer and Medicine (EMCM\u201916) . Atlantis Press.","DOI":"10.2991\/emcm-16.2017.138"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_1_88_2","first-page":"1","volume-title":"Hot Chips Symposium","author":"Vera Xavier","year":"2020","unstructured":"Xavier Vera. 2020. Inside tiger lake: Intel\u2019s next generation mobile client CPU. In Hot Chips Symposium. 1\u201326."},{"key":"e_1_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2411254"},{"key":"e_1_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_1_91_2","volume-title":"31st Euromicro Conference on Real-Time Systems (ECRTS\u201919)","author":"Walls Robert J.","year":"2019","unstructured":"Robert J. Walls, Nicholas F. Brown, Thomas Le Baron, Craig A. Shue, Hamed Okhravi, and Bryan C. Ward. 2019. Control-flow integrity for real-time embedded systems. In 31st Euromicro Conference on Real-Time Systems (ECRTS\u201919). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"e_1_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2018.10.002"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2017.0459"},{"key":"e_1_3_1_95_2","first-page":"1","volume-title":"2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS\u201916)","author":"Yoon Man-Ki","year":"2016","unstructured":"Man-Ki Yoon, Sibin Mohan, Chien-Ying Chen, and Lui Sha. 2016. Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems. In 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS\u201916). IEEE, 1\u201312."},{"key":"e_1_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2852805"},{"key":"e_1_3_1_97_2","first-page":"337","volume-title":"22nd  \\( \\lbrace \\) USENIX \\( \\rbrace \\)  Security Symposium ( \\( \\lbrace \\) USENIX \\( \\rbrace \\)  Security\u201913)","author":"Zhang Mingwei","year":"2013","unstructured":"Mingwei Zhang and R. Sekar. 2013. Control flow integrity for \\( \\lbrace \\) COTS \\( \\rbrace \\) binaries. In 22nd \\( \\lbrace \\) USENIX \\( \\rbrace \\) Security Symposium ( \\( \\lbrace \\) USENIX \\( \\rbrace \\) Security\u201913). 337\u2013352."},{"key":"e_1_3_1_98_2","first-page":"1219","volume-title":"29th USENIX Security Symposium (USENIX Security\u201920)","author":"Zhou Jie","year":"2020","unstructured":"Jie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, and Robert J. Walls. 2020. Silhouette: Efficient protected shadow stacks for embedded systems. In 29th USENIX Security Symposium (USENIX Security\u201920). USENIX Association, 1219\u20131236. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/zhou-jie."},{"key":"e_1_3_1_99_2","unstructured":"Nikola Zlatanov. 2016. ARM Architecture and RISC Applications. (2016). https:\/\/www.researchgate.net\/profile\/Nikola-Zlatanov\/publication\/295921119_ARM_Architecture_and_RISC_Applications\/links\/56d0ece908ae059e375d4df5\/ARM-Architecture-and-RISC-Applications.pdf."}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538275","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:13Z","timestamp":1750186813000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,31]]},"references-count":98,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,7,31]]}},"alternative-id":["10.1145\/3538275"],"URL":"https:\/\/doi.org\/10.1145\/3538275","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"value":"1539-9087","type":"print"},{"value":"1558-3465","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,31]]},"assertion":[{"value":"2021-03-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-04-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}