{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:48:48Z","timestamp":1730342928616,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.23919\/date.2019.8715277","type":"proceedings-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T21:29:07Z","timestamp":1558042147000},"page":"740-745","source":"Crossref","is-referenced-by-count":6,"title":["RiskiM: Toward Complete Kernel Protection with Hardware Support"],"prefix":"10.23919","author":[{"given":"Dongil","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Myonghoon","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Seongil","family":"Jeon","sequence":"additional","affiliation":[]},{"given":"Younghan","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Donghyun","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Yunheung","family":"Paek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2017.2784416"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3092627.3092629"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853201"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196061"},{"year":"2018","key":"ref11","article-title":"Secure technology"},{"year":"2018","key":"ref12","article-title":"ios security guide"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660303"},{"key":"ref14","first-page":"1","article-title":"Armv8 debug and trace architectures","author":"williams","year":"2012","journal-title":"System Software SoC and Silicon Debug Conference (S4D) 2012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2591635.2667184"},{"key":"ref16","first-page":"1827","article-title":"Unified extensible firmware interface specification","volume":"2","author":"unified","year":"2014","journal-title":"Version"},{"journal-title":"XILINX Tech Rep","article-title":"Axi interrupt controller (intc) v4.1 - logicore ip product guide","year":"2018","key":"ref17"},{"key":"ref18","article-title":"Intel&#x00AE; 64 and ia-32 architectures software developer&#x2019;s manual","volume":"3","author":"guide","year":"2018","journal-title":"Volume 3B System Programming Guide Part 2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064216"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053029"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3850\/9783981537079_0550"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23218"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.36"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.24"},{"key":"ref5","article-title":"Design and implementation of secpod, a framework for virtualization-based security systems","author":"wang","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2948623"},{"key":"ref7","first-page":"1","article-title":"Ki-mon arm: a hardware-assisted event-triggered monitoring platform for mutable kernel object","author":"lee","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"article-title":"Rootkit evolution","year":"2014","author":"shevchenko","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_1"},{"year":"2018","key":"ref1","article-title":"Linux kernel : Vulnerability statistics"},{"year":"2013","key":"ref20","article-title":"zynq-7000 all programmable soc zc706 evaluation kit"},{"key":"ref22","first-page":"347","article-title":"Secpod: a framework for virtualization-based security systems","author":"wang","year":"2015","journal-title":"USENIX Annual Technical Conference"},{"key":"ref21","article-title":"The risc-v instruction set manual volume 2: Privileged architecture version 1.7","author":"waterman","year":"2015","journal-title":"Tech Rep"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23421"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.013"},{"key":"ref26","article-title":"Byte-unixbench: A unix benchmark suite","author":"smith","year":"2011","journal-title":"Technical Report"},{"year":"2016","key":"ref25","article-title":"Synopsis design compiler user guide"}],"event":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2019,3,25]]},"location":"Florence, Italy","end":{"date-parts":[[2019,3,29]]}},"container-title":["2019 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8704855\/8714721\/08715277.pdf?arnumber=8715277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T23:50:11Z","timestamp":1559605811000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8715277\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":33,"URL":"https:\/\/doi.org\/10.23919\/date.2019.8715277","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}