{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T14:28:55Z","timestamp":1754144935028,"version":"3.41.2"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,13]]},"DOI":"10.1145\/3735452.3735522","type":"proceedings-article","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T15:11:16Z","timestamp":1749827476000},"page":"158-169","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["R-Visor: An Extensible Dynamic Binary Instrumentation and Analysis Framework for Open Instruction Set Architectures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7158-5608","authenticated-orcid":false,"given":"Edwin","family":"Kayang","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1002-2515","authenticated-orcid":false,"given":"Mishel Jyothis","family":"Paul","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5511-7975","authenticated-orcid":false,"given":"Eric","family":"Jahns","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5696-8964","authenticated-orcid":false,"given":"Muslum Ozgur","family":"Ozmen","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0602-0606","authenticated-orcid":false,"given":"Milan","family":"Stojkov","sequence":"additional","affiliation":[{"name":"University of Novi Sad, Novi Sad, Serbia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8642-608X","authenticated-orcid":false,"given":"Kevin","family":"Rudd","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1432-6939","authenticated-orcid":false,"given":"Michel A.","family":"Kinsy","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,6,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n. d.]. embench.org. https:\/\/www.embench.org\/ [Accessed 14-03-2025]"},{"key":"e_1_3_2_2_2_1","unstructured":"[n. d.]. www2.eecs.berkeley.edu. https:\/\/www2.eecs.berkeley.edu\/Pubs\/TechRpts\/2015\/EECS-2015-209.pdf [Accessed 18-03-2025]"},{"key":"e_1_3_2_2_3_1","volume-title":"DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings 5. 64\u201387","author":"Aaraj Najwa","year":"2008","unstructured":"Najwa Aaraj, Anand Raghunathan, and Niraj K Jha. 2008. Dynamic binary instrumentation-based framework for malware defense. In Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings 5. 64\u201387."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO51591.2021.9370313"},{"key":"e_1_3_2_2_5_1","volume-title":"Kinsy","author":"Bandara Sahan","year":"2018","unstructured":"Sahan Bandara, Alan Ehret, Donato Kava, and Michel A. Kinsy. 2018. BRISC-V: Open Source Architectural Design Space Exploration Toolbox."},{"key":"e_1_3_2_2_6_1","first-page":"10","article-title":"QEMU, a fast and portable dynamic translator.. In USENIX annual technical conference","volume":"41","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard. 2005. QEMU, a fast and portable dynamic translator.. In USENIX annual technical conference, FREENIX Track. 41, 10\u20135555.","journal-title":"FREENIX Track."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024569.2024572"},{"key":"e_1_3_2_2_8_1","unstructured":"Derek Bruening and Saman Amarasinghe. 2004. Efficient transparent and comprehensive runtime code manipulation."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HiPC.2013.6799106"},{"key":"e_1_3_2_2_10_1","unstructured":"OpenRISC Community. [n. d.]. OpenRISC - OpenRISC \u2014 openrisc.io. https:\/\/openrisc.io\/ [Accessed 13-02-2025]"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3246491"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329819"},{"key":"e_1_3_2_2_13_1","unstructured":"[n. d.]. GitHub - DynamoRIO\/dynamorio: Dynamic Instrumentation Tool Platform \u2014 github.com. https:\/\/github.com\/DynamoRIO\/dynamorio [Accessed 04-09-2024]"},{"key":"e_1_3_2_2_14_1","volume-title":"USENIX 1995 Technical Conference (USENIX 1995 Technical Conference).","author":"Eustace Alan","year":"1995","unstructured":"Alan Eustace and Amitabh Srivastava. 1995. $ATOM$: A Flexible Interface for Building High Performance Program Analysis Tools. In USENIX 1995 Technical Conference (USENIX 1995 Technical Conference)."},{"key":"e_1_3_2_2_15_1","unstructured":"[n. d.]. LibElf - FreeBSD Wiki \u2014 wiki.freebsd.org. https:\/\/wiki.freebsd.org\/LibElf [Accessed 27-02-2025]"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2024.3383964"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420981"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC52423.2021.9658643"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","unstructured":"Edwin Kayang. 2025. R-Visor. Zenodo. https:\/\/doi.org\/10.5281\/zenodo.15300671 10.5281\/zenodo.15300671","DOI":"10.5281\/zenodo.15300671"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2010.5452024"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3497776.3517764"},{"key":"e_1_3_2_2_22_1","volume-title":"Vijay Janapa Reddi, and Kim Hazelwood","author":"Luk Chi-Keung","year":"2005","unstructured":"Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa Reddi, and Kim Hazelwood. 2005. Pin: building customized program analysis tools with dynamic instrumentation. Acm sigplan notices, 40, 6 (2005), 190\u2013200."},{"key":"e_1_3_2_2_23_1","unstructured":"[n. d.]. ptrace(2) - Linux manual page \u2014 man7.org. https:\/\/man7.org\/linux\/man-pages\/man2\/ptrace.2.html [Accessed 11-09-2024]"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93550"},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the First EPIC Workshop.","author":"Ramasamy Vinodha","year":"2001","unstructured":"Vinodha Ramasamy and Robert Hundt. 2001. Dynamic binary instrumentation on IA-64. In Proceedings of the First EPIC Workshop."},{"key":"e_1_3_2_2_27_1","unstructured":"[n. d.]. riscv.org. https:\/\/riscv.org\/wp-content\/uploads\/2017\/05\/riscv-spec-v2.2.pdf [Accessed 12-09-2024]"},{"key":"e_1_3_2_2_28_1","unstructured":"Jeff Scheel. [n. d.]. Ratified Extensions - Home - RISC-V Tech Hub \u2014 lf-riscv.atlassian.net. https:\/\/lf-riscv.atlassian.net\/wiki\/spaces\/HOME\/pages\/16154732\/Ratified+Extensions [Accessed 06-03-2025]"},{"key":"e_1_3_2_2_29_1","unstructured":"Trusted Secure and Arizona State University Assured Microelectronics Center. [n. d.]. GitHub - stamcenter\/r-visor \u2014 github.com. https:\/\/github.com\/stamcenter\/r-visor [Accessed 05-05-2025]"},{"key":"e_1_3_2_2_30_1","volume-title":"Bridging the Gap: A Focused DSL for RV-Oriented Instrumentation with BISM. In International Conference on Runtime Verification. 327\u2013338","author":"Soueidi Chukri","year":"2023","unstructured":"Chukri Soueidi and Yli\u00e8s Falcone. 2023. Bridging the Gap: A Focused DSL for RV-Oriented Instrumentation with BISM. In International Conference on Runtime Verification. 327\u2013338."},{"volume-title":"d.]. Spike RISC-V ISA Simulator. https:\/\/github.com\/riscv-software-src\/riscv-isa-sim Accessed","year":"2024","key":"e_1_3_2_2_31_1","unstructured":"[n. d.]. Spike RISC-V ISA Simulator. https:\/\/github.com\/riscv-software-src\/riscv-isa-sim Accessed: June 12, 2024"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11223833"},{"key":"e_1_3_2_2_33_1","unstructured":"Terasic Technologies. [n. d.]. Terasic - All FPGA Boards - Stratix V - DE5-Net FPGA Development Kit \u2014 terasic.com.tw. https:\/\/www.terasic.com.tw\/cgi-bin\/page\/archive.pl?Language=English&No=526 [Accessed 18-03-2025]"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD51259.2020.00045"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480128"},{"key":"e_1_3_2_2_36_1","unstructured":"Tool Interface Standards (TIS) Committee. 1995. Tool Interface Standard (TIS) Executable and Linking Format (ELF) Specification Version 1.2. https:\/\/refspecs.linuxfoundation.org\/elf\/elf.pdf"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358307"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS49936.2021.00054"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"Andrew Waterman Yunsup Lee David Patterson Krste Asanovic Volume I User level Isa Andrew Waterman Yunsup Lee and David Patterson. 2014. The RISC-V instruction set manual. Volume I: User-Level ISA\u2019 version 2 (2014) 1\u201379.","DOI":"10.21236\/ADA605735"},{"key":"e_1_3_2_2_40_1","volume-title":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 3\u201323","author":"Wichelmann Jan","year":"2023","unstructured":"Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna P\u00e4tschke, and Thomas Eisenbarth. 2023. MAMBO\u2013V: Dynamic Side-Channel Leakage Analysis on RISC\u2013V. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 3\u201323."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338502.3359763"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576208"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO51591.2021.9370312"}],"event":{"name":"LCTES '25: 26th ACM SIGPLAN\/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Seoul Republic of Korea","acronym":"LCTES '25"},"container-title":["Proceedings of the 26th ACM SIGPLAN\/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3735452.3735522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T07:13:02Z","timestamp":1752649982000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3735452.3735522"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,13]]},"references-count":43,"alternative-id":["10.1145\/3735452.3735522","10.1145\/3735452"],"URL":"https:\/\/doi.org\/10.1145\/3735452.3735522","relation":{},"subject":[],"published":{"date-parts":[[2025,6,13]]},"assertion":[{"value":"2025-06-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}