{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:49:36Z","timestamp":1759092576781},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.23919\/date48585.2020.9116396","type":"proceedings-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T23:28:37Z","timestamp":1592263717000},"page":"1606-1609","source":"Crossref","is-referenced-by-count":1,"title":["BackFlow: Backward Edge Control Flow Enforcement for Low End ARM Microcontrollers"],"prefix":"10.23919","author":[{"given":"Cyril","family":"Bresch","sequence":"first","affiliation":[]},{"given":"Roman","family":"Lysecky","sequence":"additional","affiliation":[]},{"given":"David","family":"Hely","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10","article-title":"Control Flow Guard"},{"key":"ref11","first-page":"385","article-title":"ROP is Still Dangerous: Breaking Modem Defenses ROP is Still Dangerous : Breaking Modem Defenses","author":"carlini","year":"2014","journal-title":"23rd USENIX Security Symposium ( USENIX Security 14)"},{"year":"2015","key":"ref12","article-title":"Procedure Call Standard for the ARM Architecture"},{"article-title":"SecPump","year":"2017","author":"bresch","key":"ref13"},{"key":"ref14","first-page":"3","article-title":"MiBench : A free , commercially representative embedded benchmark suite The University of Michigan Electrical Engineering and Computer Science","author":"guthaus","year":"2001","journal-title":"Proc Fourth Annu IEEE Int Work Workload Charact WWC-4 (Cat No 01EX538)"},{"key":"ref4","first-page":"243","article-title":"Stackguard: Simple stack smash protection for gcc","author":"wagle","year":"2003","journal-title":"Croc GCC Dev Summit"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"ref5","article-title":"MoCFI: A framework to mitigate control-flow attacks on smartphones","author":"davi","year":"2012","journal-title":"Proc Symp Netw Distrib Syst Security"},{"year":"0","key":"ref8","article-title":"LLVM"},{"key":"ref7","first-page":"177","article-title":"PAC it up : Towards Pointer Integrity using ARM Pointer Authentication *","author":"liljestrand","year":"2019","journal-title":"Proceedings of the 28th USENIX Security Symposium ( USENIX Security 19)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"ref9","first-page":"941","article-title":"Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM","author":"tice","year":"2014","journal-title":"23rd USENIX Security Symposium ( USENIX Security 14)"}],"event":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2020,3,9]]},"location":"Grenoble, France","end":{"date-parts":[[2020,3,13]]}},"container-title":["2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9112295\/9116186\/09116396.pdf?arnumber=9116396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T22:43:08Z","timestamp":1594680188000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9116396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.23919\/date48585.2020.9116396","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}