{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:24Z","timestamp":1772039484010,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["2237238"],"award-info":[{"award-number":["2237238"]}]},{"name":"NCAE","award":["H98230-22-1-0307"],"award-info":[{"award-number":["H98230-22-1-0307"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,8]]},"DOI":"10.1145\/3605098.3635925","type":"proceedings-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T17:59:16Z","timestamp":1716314356000},"page":"1350-1357","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-6368-1523","authenticated-orcid":false,"given":"Xi","family":"Tan","sequence":"first","affiliation":[{"name":"University at Buffalo, Buffalo, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6090-6148","authenticated-orcid":false,"given":"Sagar","family":"Mohan","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5264-7962","authenticated-orcid":false,"given":"Md","family":"Armanuzzaman","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5631-0466","authenticated-orcid":false,"given":"Zheyuan","family":"Ma","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9304-8317","authenticated-orcid":false,"given":"Gaoxiang","family":"Liu","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8774-8885","authenticated-orcid":false,"given":"Alex","family":"Eastman","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8710-247X","authenticated-orcid":false,"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4930-5556","authenticated-orcid":false,"given":"Ziming","family":"Zhao","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. Apache Mynewt. https:\/\/github.com\/apache\/mynewt-core. (2023)."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. Apache NuttX. https:\/\/nuttx.apache.org\/. (2023)."},{"key":"e_1_3_2_1_3_1","unstructured":"2023. ARM Cortex-M. https:\/\/www.arm.com\/products\/silicon-ip-cpu?families=cortex-m&showall=true. (2023)."},{"key":"e_1_3_2_1_4_1","unstructured":"2023. Armv8.1-M Pointer Authentication and Branch Target Identification Extension. https:\/\/community.arm.com\/arm-community-blogs\/b\/architectures-and-processors-blog\/posts\/armv8-1-m-pointer-authentication-and-branch-target-identification-extension. (2023)."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Azure RTOS ThreadX. https:\/\/github.com\/azure-rtos\/threadx. (2023)."},{"key":"e_1_3_2_1_6_1","unstructured":"2023. Bern RTOS. https:\/\/bern-rtos.org\/. (2023)."},{"key":"e_1_3_2_1_7_1","volume-title":"Best IoT Operating Systems of","year":"2023","unstructured":"2023. Best IoT Operating Systems of 2023. https:\/\/slashdot.org\/software\/iot-operating-systems\/. (2023)."},{"key":"e_1_3_2_1_8_1","volume-title":"Best Real-Time Operating Systems (RTOSs) of","year":"2023","unstructured":"2023. Best Real-Time Operating Systems (RTOSs) of 2023. https:\/\/slashdot.org\/software\/real-time-operating-systems-rtos\/. (2023)."},{"key":"e_1_3_2_1_9_1","unstructured":"2023. Blinky sample. https:\/\/docs.zephyrproject.org\/latest\/samples\/basic\/blinky\/README.html. (2023)."},{"key":"e_1_3_2_1_10_1","unstructured":"2023. Contiki-NG: The OS for Next Generation IoT Devices. https:\/\/www.contiki-ng.org\/. (2023)."},{"key":"e_1_3_2_1_11_1","unstructured":"2023. FreeRTOS: Real-time operating system for microcontrollers. https:\/\/www.freertos.org\/. (2023)."},{"key":"e_1_3_2_1_12_1","unstructured":"2023. Ghidra website. https:\/\/ghidra-sre.org\/. (2023)."},{"key":"e_1_3_2_1_13_1","unstructured":"2023. GNU C library. https:\/\/elixir.bootlin.com\/glibc\/glibc-2.38\/source. (2023)."},{"key":"e_1_3_2_1_14_1","unstructured":"2023. Linux version 6.5.5. https:\/\/elixir.free-electrons.com\/linux\/v6.5.5\/source. (2023)."},{"key":"e_1_3_2_1_15_1","unstructured":"2023. LitOS Github. https:\/\/github.com\/LiteOS\/LiteOS. (2023)."},{"key":"e_1_3_2_1_16_1","unstructured":"2023. Mongoose OS. https:\/\/mongoose-os.com\/. (2023)."},{"key":"e_1_3_2_1_17_1","unstructured":"2023. Multi-threding sample. https:\/\/docs.zephyrproject.org\/latest\/samples\/kernel\/condition_variables\/simple\/README.html. (2023)."},{"key":"e_1_3_2_1_18_1","unstructured":"2023. NUCLEO-F412ZG board. https:\/\/www.st.com\/en\/evaluation-tools\/nucleo-f412zg.html. (2023)."},{"key":"e_1_3_2_1_19_1","unstructured":"2023. Object size checking to prevent (some) buffer overflows. https:\/\/gcc.gnu.org\/legacy-ml\/gcc-patches\/2004-09\/msg02055.html. (2023)."},{"key":"e_1_3_2_1_20_1","unstructured":"2023. OpenWrt. https:\/\/openwrt.org\/start. (2023)."},{"key":"e_1_3_2_1_21_1","unstructured":"2023. Producer\/consumer sample. https:\/\/docs.zephyrproject.org\/latest\/samples\/userspace\/prod_consumer\/README.html. (2023)."},{"key":"e_1_3_2_1_22_1","unstructured":"2023. RIoT. https:\/\/github.com\/RIOT-OS\/RIOT. (2023)."},{"key":"e_1_3_2_1_23_1","unstructured":"2023. RT-Thread. https:\/\/www.rt-thread.io\/. (2023)."},{"key":"e_1_3_2_1_24_1","unstructured":"2023. Samsung TizenRT. https:\/\/github.com\/Samsung\/TizenRT. (2023)."},{"key":"e_1_3_2_1_25_1","unstructured":"2023. Samsung TizenRT: stack_protector.c. https:\/\/github.com\/Samsung\/TizenRT\/blob\/1c9e6fdbb53006a50702eca23abbf4b5cca5c1c7\/os\/board\/rtl8730e\/src\/component\/soc\/amebad2\/atf\/lib\/stack_protector\/stack_protector.c. (2023)."},{"key":"e_1_3_2_1_26_1","unstructured":"2023. The Arm ecosystem ships a record 6.7 billion Arm-based chips in a single quarter. https:\/\/www.arm.com\/company\/news\/2021\/02\/arm-ecosystem-ships-record-6-billion-arm-based-chips-in-a-single-quarter. (2023)."},{"key":"e_1_3_2_1_27_1","unstructured":"2023. The GNU Compiler Collection. https:\/\/gcc.gnu.org\/. (2023)."},{"key":"e_1_3_2_1_28_1","unstructured":"2023. TI-RTOS (RTOS Kernel) Overview. https:\/\/software-dl.ti.com\/simplelink\/esd\/simplelink_cc13x0_sdk\/4.10.02.04\/exports\/docs\/proprietary-rf\/proprietary-rf-users-guide\/proprietary-rf-guide\/tirtos-index.html. (2023)."},{"key":"e_1_3_2_1_29_1","unstructured":"2023. TinyOS. https:\/\/github.com\/tinyos\/tinyos-main. (2023)."},{"key":"e_1_3_2_1_30_1","unstructured":"2023. Zephy. https:\/\/github.com\/zephyrproject-rtos\/zephyr\/releases\/tag\/v3.5.0. (2023)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00013"},{"key":"e_1_3_2_1_32_1","unstructured":"Crispan Cowan Calton Pu Dave Maier Jonathan Walpole Peat Bakke Steve Beattie Aaron Grier Perry Wagle Qian Zhang and Heather Hinton. 1998. Stack-guard: automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX security symposium."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_1_34_1","volume-title":"Hardware assisted buffer protection mechanisms for embedded RISC-V. Transactions on Computer-Aided Design of Integrated Circuits and Systems","author":"De Asmit","year":"2020","unstructured":"Asmit De, Aditya Basu, Swaroop Ghosh, and Trent Jaeger. 2020. Hardware assisted buffer protection mechanisms for embedded RISC-V. Transactions on Computer-Aided Design of Integrated Circuits and Systems (2020)."},{"key":"e_1_3_2_1_35_1","volume-title":"Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage. In USENIX Security Symposium.","author":"Du Yufei","year":"2022","unstructured":"Yufei Du, Zhuojia Shen, Komail Dharsee, Jie Zhou, Robert J Walls, and John Criswell. 2022. Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage. In USENIX Security Symposium."},{"key":"e_1_3_2_1_36_1","unstructured":"Qualcomm Technologies Inc. 2023. Pointer Authentication on ARMv8.3. https:\/\/www.qualcomm.com\/content\/dam\/qcomm-martech\/dm-assets\/documents\/pointer-auth-v7.pdf. (2023)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179285"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179388"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132786"},{"key":"e_1_3_2_1_40_1","volume-title":"Protecting the Stack with PACed Canaries. In Workshop on System Software for Trusted Execution. ACM.","author":"Liljestrand Hans","unstructured":"Hans Liljestrand, Zaheer Gauhar, Thomas Nyman, Jan-Erik Ekberg, and N. Asokan. 2019. Protecting the Stack with PACed Canaries. In Workshop on System Software for Trusted Execution. ACM."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2013.12"},{"key":"e_1_3_2_1_42_1","volume-title":"Physical one-way functions. Science","author":"Pappu Ravikanth","year":"2002","unstructured":"Ravikanth Pappu, Ben Recht, Jason Taylor, and Neil Gershenfeld. 2002. Physical one-way functions. Science (2002)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3375734"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_45_1","unstructured":"Zephyr. 2023. Zephyr RTOS. https:\/\/zephyrproject.org\/. (2023)."},{"key":"e_1_3_2_1_46_1","volume-title":"compiler_stack_protect.c","author":"Project Zephyr","year":"2023","unstructured":"Zephyr Project: compiler_stack_protect.c. 2023. Stack Overflows Detection. https:\/\/github.com\/zephyrproject-rtos\/zephyr\/blob\/078967671c9038367edeb60818c0e69015320e32\/kernel\/compiler_stack_protect.c. (2023)."},{"key":"e_1_3_2_1_47_1","volume-title":"USENIX Security Symposium.","author":"Zhou Jie","year":"2020","unstructured":"Jie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, and Robert J Walls. 2020. Silhouette: Efficient protected shadow stacks for embedded systems. In USENIX Security Symposium."},{"key":"e_1_3_2_1_48_1","volume-title":"Good motive but bad design: Why ARM MPU has become an outcast in embedded systems. arXiv preprint arXiv:1908.03638","author":"Zhou Wei","year":"2019","unstructured":"Wei Zhou, Le Guan, Peng Liu, and Yuqing Zhang. 2019. Good motive but bad design: Why ARM MPU has become an outcast in embedded systems. arXiv preprint arXiv:1908.03638 (2019)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Wei Zhou Zhouqi Jiang and Le Guan. 2023. Understanding MPU Usage in Microcontroller-based Systems in the Wild. (2023).","DOI":"10.14722\/bar.2023.23007"}],"event":{"name":"SAC '24: 39th ACM\/SIGAPP Symposium on Applied Computing","location":"Avila Spain","acronym":"SAC '24","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3635925","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605098.3635925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:14Z","timestamp":1750178174000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3635925"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,8]]},"references-count":49,"alternative-id":["10.1145\/3605098.3635925","10.1145\/3605098"],"URL":"https:\/\/doi.org\/10.1145\/3605098.3635925","relation":{},"subject":[],"published":{"date-parts":[[2024,4,8]]},"assertion":[{"value":"2024-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}