{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:10:05Z","timestamp":1755900605922,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":89,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1145\/3734477.3734710","type":"proceedings-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T21:11:01Z","timestamp":1751058661000},"page":"16-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Run-time Attestation and Auditing: The Verifier's Perspective"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5631-7328","authenticated-orcid":false,"given":"Adam Ilyas","family":"Caulfield","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1192-5079","authenticated-orcid":false,"given":"Norrathep","family":"Rattanavipanon","sequence":"additional","affiliation":[{"name":"Prince of Songkla University, Phuket, Thailand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3486-6550","authenticated-orcid":false,"given":"Ivan De Oliveira","family":"Nunes","sequence":"additional","affiliation":[{"name":"University of Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS). 743--754","author":"Tigist","key":"e_1_3_2_1_1_1","unstructured":"Tigist Abera et al. 2016. C-FLAT: control-flow attestation for embedded systems software. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS). 743--754."},{"volume-title":"2025 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 77--77","author":"Mahmoud","key":"e_1_3_2_1_2_1","unstructured":"Mahmoud Ammar et al. 2024. SoK: Integrity, Attestation, and Auditing of Program Execution. In 2025 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 77--77."},{"key":"e_1_3_2_1_3_1","volume-title":"ENOLA: Efficient Control-Flow Attestation for Embedded Systems. arXiv preprint arXiv:2501.11207","author":"Md Armanuzzaman","year":"2025","unstructured":"Md Armanuzzaman et al. 2025. ENOLA: Efficient Control-Flow Attestation for Embedded Systems. arXiv preprint arXiv:2501.11207 (2025)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"volume-title":"Proceedings of the 6th ACM symposium on information, computer and communications security (CCS). 30--40","author":"Tyler","key":"e_1_3_2_1_5_1","unstructured":"Tyler Bletsch et al. 2011. Jump-oriented programming: a new class of code-reuse attack. In Proceedings of the 6th ACM symposium on information, computer and communications security (CCS). 30--40."},{"volume-title":"Proceedings of the 52nd annual design automation conference (DAC). 1--6.","author":"Ferdinand","key":"e_1_3_2_1_6_1","unstructured":"Ferdinand Brasser et al. 2015. TyTAN: Tiny trust anchor for tiny devices. In Proceedings of the 52nd annual design automation conference (DAC). 1--6."},{"key":"e_1_3_2_1_7_1","volume-title":"IEEE Symposium on Security and Privacy (SP). IEEE, 985--999","author":"Nathan Burowet","year":"2019","unstructured":"Nathan Burowet al. 2019. SoK: Shining light on shadowstacks. In IEEE Symposium on Security and Privacy (SP). IEEE, 985--999."},{"volume-title":"Proceedings of the 59th ACM\/IEEE Design Automation Conference (DAC). 721--726","author":"Adam","key":"e_1_3_2_1_8_1","unstructured":"Adam Caulfield et al. 2022. ASAP: reconciling asynchronous real-time operations and proofs of execution in simple embedded systems. In Proceedings of the 59th ACM\/IEEE Design Automation Conference (DAC). 721--726."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Adam Caulfield et al. 2024. SpecCFA: Enhancing Control Flow Attestation\/Auditing via Application-Aware Sub-Path Speculation. (2024) 563--578.","DOI":"10.1109\/ACSAC63791.2024.00055"},{"key":"e_1_3_2_1_10_1","volume-title":"TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems.","author":"Adam Caulfield","year":"2024","unstructured":"Adam Caulfield et al. 2024. TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems. (2024), 257--270."},{"key":"e_1_3_2_1_11_1","unstructured":"Adam Caulfield et al. 2025. Github Repository for SABRE Prototype. https:\/\/github.com\/SPINS-RG\/SABRE."},{"volume-title":"32nd USENIX Security Symposium. USENIX Association, 5827--5844","author":"Adam","key":"e_1_3_2_1_12_1","unstructured":"Adam Caulfield and otehrs. 2023. ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation. In 32nd USENIX Security Symposium. USENIX Association, 5827--5844."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Long Cheng et al. 2019. Exploitation techniques and defenses for data-oriented attacks. In 2019 IEEE Cybersecurity Development (SecDev). IEEE 114--128.","DOI":"10.1109\/SecDev.2019.00022"},{"volume-title":"One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices. In IEEE Symposium on Security and Privacy (SP). IEEE, 203--203","author":"Marco","key":"e_1_3_2_1_14_1","unstructured":"Marco Chilese et al. 2024. One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices. In IEEE Symposium on Security and Privacy (SP). IEEE, 203--203."},{"key":"e_1_3_2_1_15_1","unstructured":"Bob Lord (CISA). 2023. The Urgent Need for Memory Safety in Software Products. https:\/\/www.cisa.gov\/news-events\/news\/urgent-need-memory-safetysoftware-products."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0124-7"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings DARPA Information Survivability Conference and Exposition (DISCEX)","volume":"2","author":"Crispin","unstructured":"Crispin Cowan et al. 2000. Buffer overflows: Attacks and defenses for the vulnerability of the decade. In Proceedings DARPA Information Survivability Conference and Exposition (DISCEX), Vol. 2. IEEE, 119--129."},{"volume-title":"Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (AsiaCCS). 357--371","author":"Bergsson Heini","key":"e_1_3_2_1_18_1","unstructured":"Heini Bergsson Debes et al. 2023. ZEKRA: Zero-Knowledge Control-Flow Attestation. In Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (AsiaCCS). 357--371."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIES.2016.7509439"},{"volume-title":"Proceedings of the 54th Annual Design Automation Conference (DAC). 1--6.","author":"Ghada","key":"e_1_3_2_1_20_1","unstructured":"Ghada Dessouky et al. 2017. LO-FAT: Low-overhead control flow attestation in hardware. In Proceedings of the 54th Annual Design Automation Conference (DAC). 1--6."},{"volume-title":"International Conference on Computer-Aided Design (ICCAD). IEEE, 1--8.","author":"Ghada","key":"e_1_3_2_1_21_1","unstructured":"Ghada Dessouky et al. 2018. Litehax: lightweight hardware-assisted attestation of program execution. In International Conference on Computer-Aided Design (ICCAD). IEEE, 1--8."},{"volume-title":"Network and Distributed System Security (NDSS) Symposium.","author":"Ruian","key":"e_1_3_2_1_22_1","unstructured":"Ruian Duan et al. 2019. Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.. In Network and Distributed System Security (NDSS) Symposium."},{"volume-title":"Proceedings of the 41st ACM SIGPLAN conference on programming language design and implementation (PLDI). 151--163","author":"Gregory","key":"e_1_3_2_1_23_1","unstructured":"Gregory J Duck et al. 2020. Binary rewriting without control flow recovery. In Proceedings of the 41st ACM SIGPLAN conference on programming language design and implementation (PLDI). 151--163."},{"key":"e_1_3_2_1_24_1","volume-title":"SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In Network and Distributed System Security (NDSS) Symposium","volume":"12","author":"Karim","unstructured":"Karim Eldefrawy et al. 2012. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In Network and Distributed System Security (NDSS) Symposium, Vol. 12. 1--15."},{"volume-title":"Applied Cryptography and Network Security (ACNS)","author":"Eldefrawy Karim","key":"e_1_3_2_1_25_1","unstructured":"Karim Eldefrawy, Michael Locasto, Norrathep Rattanavipanon, and Hassen Saidi. 2020. Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables. In Applied Cryptography and Network Security (ACNS). Springer, 364--384."},{"key":"e_1_3_2_1_26_1","unstructured":"Free Software Foundation. 2024. arm-none-eabi-objdump man page. https:\/\/manpages.debian.org\/unstable\/binutils-arm-none-eabi\/arm-none-eabiobjdump.1.en.html"},{"key":"e_1_3_2_1_27_1","unstructured":"Free Software Foundation. 2024. msp430-objdump man page. https:\/\/manpages.debian.org\/testing\/binutils-msp430\/msp430-objdump.1.en.html"},{"key":"e_1_3_2_1_28_1","unstructured":"Python Software Foundation. 2024. Python libary pyelftools. https:\/\/pypi.org\/project\/pyelftools\/0.20\/"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949036"},{"key":"e_1_3_2_1_30_1","unstructured":"Intel. 2015. Intel Processor Trace. https:\/\/edc.intel.com\/content\/www\/us\/en\/design\/ipla\/software-development-platforms\/client\/platforms\/alderlake- desktop\/12th-generation-intel-core-processors-datasheet-volume-1-of-2\/010\/intel-processor-trace\/. [Online; accessed 14-March-2025]."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510410"},{"key":"e_1_3_2_1_32_1","volume-title":"12th USENIX Security Symposium.","author":"Kennell Rick","year":"2003","unstructured":"Rick Kennell and Leah H Jamieson. 2003. Establishing the genuinity of remote computer systems. In 12th USENIX Security Symposium."},{"key":"e_1_3_2_1_33_1","unstructured":"Keystone. 2024. Keystone: the ultimate assembler. https:\/\/www.keystoneengine. org\/"},{"volume-title":"58th Design Automation Conference (DAC). IEEE, 319--324","author":"Pantea","key":"e_1_3_2_1_34_1","unstructured":"Pantea Kiaei et al. 2021. Rewrite to reinforce: Rewriting the binary to apply countermeasures against fault injection. In 58th Design Automation Conference (DAC). IEEE, 319--324."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"volume-title":"IEEE Symposium on Security and Privacy (SP). IEEE, 239--253","author":"Xeno","key":"e_1_3_2_1_36_1","unstructured":"Xeno Kovah et al. 2012. New results for timing-based attestation. In IEEE Symposium on Security and Privacy (SP). IEEE, 239--253."},{"volume-title":"International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 131--138","author":"Runhao","key":"e_1_3_2_1_37_1","unstructured":"Runhao Liu et al. 2022. SEEKER: A root cause analysis method based on deterministic replay for multi-type network protocol vulnerabilities. In International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 131--138."},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. of Real-Time System Simposium WIP","author":"Miguel","year":"2003","unstructured":"Miguel Masmano et al. 2003. Dynamic storage allocation for real-time embedded systems. Proc. of Real-Time System Simposium WIP (2003)."},{"key":"e_1_3_2_1_39_1","unstructured":"The MITRE Corporation (MITRE). 2024. 2024 CWE Top 25 Most Dangerous SoftwareWeaknesses. https:\/\/cwe.mitre.org\/top25\/archive\/2024\/2024_cwe_top25.html."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3565570"},{"key":"e_1_3_2_1_41_1","unstructured":"National Vulnerability Database. 2017. CVE-2017--14201. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017--14201 Accessed: 2025-May-04."},{"key":"e_1_3_2_1_42_1","unstructured":"National Vulnerability Database. 2020. CVE-2019--16127. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019--16127 Accessed: 2025-May-04."},{"key":"e_1_3_2_1_43_1","unstructured":"National Vulnerability Database. 2020. CVE-2020--10019. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020--10019 Accessed: 2025-May-04."},{"key":"e_1_3_2_1_44_1","unstructured":"National Vulnerability Database. 2020. CVE-2020--10023. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020--10023 Accessed: 2025-May-04."},{"key":"e_1_3_2_1_45_1","unstructured":"National Vulnerability Database. 2021. CVE-2021-0920. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-0920 Accessed: 2025-May-04."},{"key":"e_1_3_2_1_46_1","unstructured":"National Vulnerability Database. 2021. CVE-2021--35395. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021--35395 Accessed: 2025-May-04."},{"key":"e_1_3_2_1_47_1","unstructured":"National Vulnerability Database. 2022. CVE-2022--34835. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022--34835 Accessed: 2025-May-04."},{"key":"e_1_3_2_1_48_1","volume-title":"ISC-FLAT: On the Conflict Between Control Flow Attestation and Real-Time Operations. In 29th Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE, 133--146","author":"Neto Antonio Joia","year":"2023","unstructured":"Antonio Joia Neto and Ivan De Oliveira Nunes. 2023. ISC-FLAT: On the Conflict Between Control Flow Attestation and Real-Time Operations. In 29th Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE, 133--146."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079763"},{"volume-title":"VRASED: A Verified Hardware\/Software Co- Design for Remote Attestation. In 28th USENIX Security Symposium. 1429--1446","author":"Oliveira Ivan De","key":"e_1_3_2_1_50_1","unstructured":"Ivan De Oliveira Nunes et al. 2019. VRASED: A Verified Hardware\/Software Co- Design for Remote Attestation. In 28th USENIX Security Symposium. 1429--1446."},{"volume-title":"29th USENIX Security Symposium. 771--788","author":"Oliveira Ivan De","key":"e_1_3_2_1_51_1","unstructured":"Ivan De Oliveira Nunes et al. 2020. APEX: A verified architecture for proofs of execution on remote devices under full software compromise. In 29th USENIX Security Symposium. 771--788."},{"volume-title":"58th Design Automation Conference (DAC). IEEE, 313--318","author":"Oliveira Ivan De","key":"e_1_3_2_1_52_1","unstructured":"Ivan De Oliveira Nunes et al. 2021. Dialed: Data integrity attestation for low-end embedded devices. In 58th Design Automation Conference (DAC). IEEE, 313--318."},{"volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 641--646","author":"Oliveira Ivan De","key":"e_1_3_2_1_53_1","unstructured":"Ivan De Oliveira Nunes et al. 2021. Tiny-CFA: Minimalistic control-flow attestation using verified proofs of execution. In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 641--646."},{"key":"e_1_3_2_1_54_1","volume-title":"BEEBS: Open benchmarks for energy measurements on embedded platforms. arXiv preprint arXiv:1308.5174","author":"James Pallister","year":"2013","unstructured":"James Pallister et al. 2013. BEEBS: Open benchmarks for energy measurements on embedded platforms. arXiv preprint arXiv:1308.5174 (2013)."},{"volume-title":"IEEE Symposium on Security and Privacy (SP). IEEE","author":"Younggi","key":"e_1_3_2_1_55_1","unstructured":"Younggi Park et al. 2024. BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation. In IEEE Symposium on Security and Privacy (SP). IEEE, 1865--1883."},{"key":"e_1_3_2_1_56_1","unstructured":"Nick L Petroni Jr et al. 2004. Copilot-a coprocessor-based kernel runtime integrity monitor.. In USENIX security symposium. San Diego USA 179--194."},{"volume-title":"32nd USENIX Security Symposium. 6861--6876","author":"Narayan Prashant Hari","key":"e_1_3_2_1_57_1","unstructured":"Prashant Hari Narayan Rajput et al. 2023. ICSPatch: Automated Vulnerability Localization and {Non-Intrusive} Hotpatching in Industrial Control Systems using Data Dependence Graphs. In 32nd USENIX Security Symposium. 6861--6876."},{"volume-title":"23rd International Symposium on Computer and Information Sciences (ISCIS). IEEE, 1--6.","author":"M","key":"e_1_3_2_1_58_1","unstructured":"M Ramakrishna et al. 2008. Smart dynamic memory allocator for embedded systems. In 23rd International Symposium on Computer and Information Sciences (ISCIS). IEEE, 1--6."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/186025.186041"},{"key":"e_1_3_2_1_60_1","unstructured":"Realtek Semiconductor Corp. 2021. Realtek AP-Router SDK Advisory. https:\/\/www.realtek.com\/images\/safe-report\/Realtek_APRouter_SDK_Advisory-CVE-2021--35392_35395.pdf Accessed: 2025-May-04."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2008.09.005"},{"volume-title":"IEEE Symposium on Security and Privacy (SP). IEEE, 272--282","author":"Arvind","key":"e_1_3_2_1_63_1","unstructured":"Arvind Seshadri et al. 2004. SWATT: Software-based attestation for embedded devices. In IEEE Symposium on Security and Privacy (SP). IEEE, 272--282."},{"volume-title":"Proceedings of the twentieth ACM symposium on Operating Systems Principles (SOSP). 1--16","author":"Arvind","key":"e_1_3_2_1_64_1","unstructured":"Arvind Seshadri et al. 2005. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In Proceedings of the twentieth ACM symposium on Operating Systems Principles (SOSP). 1--16."},{"key":"e_1_3_2_1_65_1","volume-title":"SAKE: Software attestation for key establishment in sensor networks. In Distributed Computing in Sensor Systems (DCOSS). 372--385.","author":"Arvind Seshadri","year":"2008","unstructured":"Arvind Seshadri et al. 2008. SAKE: Software attestation for key establishment in sensor networks. In Distributed Computing in Sensor Systems (DCOSS). 372--385."},{"volume-title":"Proceedings of the 11th ACM conference on Computer and communications security (CCS). 298--307","author":"Hovav","key":"e_1_3_2_1_66_1","unstructured":"Hovav Shacham et al. 2004. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM conference on Computer and communications security (CCS). 298--307."},{"volume-title":"IEEE Symposium on Security and Privacy (SP). IEEE, 1433--1449","author":"Zhichuang","key":"e_1_3_2_1_67_1","unstructured":"Zhichuang Sun et al. 2020. OAT: Attesting operation integrity of embedded devices. In IEEE Symposium on Security and Privacy (SP). IEEE, 1433--1449."},{"key":"e_1_3_2_1_68_1","unstructured":"Swiftloke. 2024. Github Repository for MSProbe. https:\/\/github.com\/Swiftloke\/ MSProbe"},{"volume-title":"18th USENIX WOOT Conference on Offensive Technologies (WOOT). 149--169","author":"Xi","key":"e_1_3_2_1_69_1","unstructured":"Xi Tan et al. 2024. SoK:Where's the ''up''?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. In 18th USENIX WOOT Conference on Offensive Technologies (WOOT). 149--169."},{"key":"e_1_3_2_1_70_1","unstructured":"SymPy Development Team. 2024. sympy. https:\/\/docs.sympy.org\/latest\/index. html"},{"volume-title":"ScaRR: Scalable Runtime Remote Attestation for Complex Systems. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 121--134","author":"Flavio","key":"e_1_3_2_1_71_1","unstructured":"Flavio Toffalini et al. 2019. ScaRR: Scalable Runtime Remote Attestation for Complex Systems. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 121--134."},{"volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 746--751","author":"Jo","key":"e_1_3_2_1_72_1","unstructured":"Jo Vliegen et al. 2019. SACHa: Self-attestation of configurable hardware. In Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 746--751."},{"volume-title":"ARI: Attestation of Real-time Mission Execution Integrity. In 32nd USENIX Security Symposium. 2761--2778","author":"Jinwen","key":"e_1_3_2_1_73_1","unstructured":"Jinwen Wang et al. 2023. ARI: Attestation of Real-time Mission Execution Integrity. In 32nd USENIX Security Symposium. 2761--2778."},{"volume-title":"Proceedings of the 31st annual computer security applications conference (ACSAC). 331--340","author":"Minghua","key":"e_1_3_2_1_74_1","unstructured":"Minghua Wang et al. 2015. Binary code continent: Finer-grained control flow integrity for stripped binaries. In Proceedings of the 31st annual computer security applications conference (ACSAC). 331--340."},{"volume-title":"Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC). 299--308","author":"Richard","key":"e_1_3_2_1_75_1","unstructured":"Richard Wartell et al. 2012. Securing untrusted code via compiler-agnostic binary rewriting. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC). 299--308."},{"key":"e_1_3_2_1_76_1","first-page":"1","article-title":"From hack to elaborate technique-a survey on binary rewriting","volume":"52","author":"MatthiasWenzl","year":"2019","unstructured":"MatthiasWenzl et al. 2019. From hack to elaborate technique-a survey on binary rewriting. ACM Computing Surveys (CSUR) 52, 3 (2019), 1--37.","journal-title":"ACM Computing Surveys (CSUR)"},{"volume-title":"Proceedings of the 25th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 133--147","author":"David","key":"e_1_3_2_1_77_1","unstructured":"David Williams-King et al. 2020. Egalito: Layout-agnostic binary recompilation. In Proceedings of the 25th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 133--147."},{"volume-title":"29th USENIX Security Symposium. 2397--2414","author":"Zhengzi","key":"e_1_3_2_1_78_1","unstructured":"Zhengzi Xu et al. 2020. Automatic hot patch generation for android kernels. In 29th USENIX Security Symposium. 2397--2414."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616687"},{"volume-title":"30th USENIX Security Symposium. 1989--2006","author":"Carter","key":"e_1_3_2_1_80_1","unstructured":"Carter Yagemann et al. 2021. ARCUS: symbolic root cause analysis of exploits in production systems. In 30th USENIX Security Symposium. 1989--2006."},{"volume-title":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS). 320--336","author":"Carter","key":"e_1_3_2_1_81_1","unstructured":"Carter Yagemann et al. 2021. Automated bug hunting with data-driven symbolic root cause analysis. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS). 320--336."},{"volume-title":"2017 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 384--391","author":"Shaza","key":"e_1_3_2_1_82_1","unstructured":"Shaza Zeitouni et al. 2017. ATRIUM: Runtime attestation resilient under memory attacks. In 2017 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 384--391."},{"volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS). 3135--3149","author":"Jun","key":"e_1_3_2_1_83_1","unstructured":"Jun Zeng et al. 2022. Palant\u00edr: Optimizing attack provenance with hardware enhanced system observability. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS). 3135--3149."},{"key":"e_1_3_2_1_84_1","unstructured":"Zephyr Project. 2016. Zephyr Repository. https:\/\/github.com\/zephyrproject-rtos. Accessed: 2025-May-04."},{"volume-title":"IEEE Symposium on Security and Privacy (SP). IEEE, 559--573","author":"Chao","key":"e_1_3_2_1_85_1","unstructured":"Chao Zhang et al. 2013. Practical control flow integrity and randomization for binary executables. In IEEE Symposium on Security and Privacy (SP). IEEE, 559--573."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818016"},{"volume-title":"International Conference on Software Maintenance and Evolution (ICSME). IEEE, 47--57","author":"Xuewen","key":"e_1_3_2_1_87_1","unstructured":"Xuewen Zhang et al. 2017. Embroidery: Patching vulnerable binary code of fragmentized android devices. In International Conference on Software Maintenance and Evolution (ICSME). IEEE, 47--57."},{"volume-title":"Annual Computer Security Applications Conference (ACSAC). 311--322","author":"Yumei","key":"e_1_3_2_1_88_1","unstructured":"Yumei Zhang et al. 2021. ReCFA: resilient control-flow attestation. In Annual Computer Security Applications Conference (ACSAC). 311--322."},{"volume-title":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 629--641","author":"Hao","key":"e_1_3_2_1_89_1","unstructured":"Hao Zhou et al. 2022. NCScope: hardware-assisted analyzer for native code in android apps. In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 629--641."}],"event":{"name":"WiSec 2025: 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Arlington VA USA","acronym":"WiSec 2025"},"container-title":["18th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3734477.3734710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T21:47:38Z","timestamp":1755899258000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3734477.3734710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":89,"alternative-id":["10.1145\/3734477.3734710","10.1145\/3734477"],"URL":"https:\/\/doi.org\/10.1145\/3734477.3734710","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]},"assertion":[{"value":"2025-06-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}