{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:58:49Z","timestamp":1773511129509,"version":"3.50.1"},"reference-count":60,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/sp.2017.37","type":"proceedings-article","created":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T20:34:26Z","timestamp":1498509266000},"page":"289-303","source":"Crossref","is-referenced-by-count":84,"title":["Protecting Bare-Metal Embedded Systems with Privilege Overlays"],"prefix":"10.1109","author":[{"given":"Abraham A.","family":"Clements","sequence":"first","affiliation":[]},{"given":"Naif Saleh","family":"Almakhdhub","sequence":"additional","affiliation":[]},{"given":"Khaled S.","family":"Saab","sequence":"additional","affiliation":[]},{"given":"Prashast","family":"Srivastava","sequence":"additional","affiliation":[]},{"given":"Jinkyu","family":"Koo","sequence":"additional","affiliation":[]},{"given":"Saurabh","family":"Bagchi","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Payer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"krebs","year":"0","journal-title":"DDoS on Dyn Impacts Twitter Spotify Reddit"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/978-1-4614-0977-9_4","author":"jackson","year":"2011","journal-title":"Moving Target De-fense"},{"key":"ref33","article-title":"The malardalen wcet benchmarks: Past, present and future","volume":"15","author":"gustafsson","year":"2010","journal-title":"Open Access Series in Informatics"},{"key":"ref32","article-title":"Enhanced operating system security through efficient and fine-grained address space randomization","author":"giuffrida","year":"2012","journal-title":"Usenix Security Symp"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1655077.1655083"},{"key":"ref30","first-page":"244","article-title":"A minimalist approach to remote attestation","author":"francillon","year":"2014","journal-title":"Design Automation Test Eur"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516675"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2013.6494997"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"ref60","first-page":"715","article-title":"Dsp-stone: A dsp-oriented benchmarking methodology","author":"zivojnovic","year":"1994","journal-title":"Intl Conf on Signal Processing Applications and Technology"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"key":"ref27","first-page":"1","article-title":"Smart: Secure and minimal architecture for (establishing dynamic) root of trust","volume":"12","author":"eldefrawy","year":"2012","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783743"},{"key":"ref2","year":"0","journal-title":"FreeRToS Support Forum ARM_CM3_MPU does not seem to build in FreeRTOS 9 0 0"},{"key":"ref1","year":"0","journal-title":"FreeRTOS-MPU"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"ref22","article-title":"Stack Guard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks","author":"cowan","year":"1998","journal-title":"Usenix Security Symp"},{"key":"ref21","first-page":"95","article-title":"A large-scale analysis of the security of embedded firmwares","author":"costin","year":"2014","journal-title":"Usenix Security Symp"},{"key":"ref24","first-page":"74:1","article-title":"Hardware-assisted flow integrity extension","author":"davi","year":"2015","journal-title":"Proceedings of the 52Nd Annual Design Automation Conference ser DAC '15"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_19"},{"key":"ref26","first-page":"24","article-title":"Can you still trust your network card","author":"duflot","year":"2010","journal-title":"CanSecWest"},{"key":"ref25","first-page":"299","article-title":"You Can","author":"davi","year":"2013","journal-title":"Information Computer and Communications Security"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/186025.186041"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref59","first-page":"337","article-title":"Control flow integrity for cots binaries","author":"zhang","year":"2013","journal-title":"Usenix Security Symp"},{"key":"ref58","first-page":"559","article-title":"Practical control flow integrity and randomization for binary executables","author":"zhang","year":"2013","journal-title":"IEEE Symp on Security and Privacy"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523661"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"ref55","author":"van de ven","year":"2004","journal-title":"Exec-shield"},{"key":"ref54","article-title":"Enforcing forward-edge control-flow integrity in gcc & llym","author":"tice","year":"2014","journal-title":"Usenix Security Symp"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"ref52","author":"salwan","year":"2011","journal-title":"ROPgadget-Gadgets Finder and Auto-Roper"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"ref11","year":"2014","journal-title":"ARM Architecture Reference Manual"},{"key":"ref40","article-title":"Code Pointer Integrity","author":"kuznetsov","year":"2014","journal-title":"Usenix Symp on Operating Systems Design and Implementation"},{"key":"ref12","year":"2015","journal-title":"Arm Trustzone"},{"key":"ref13","article-title":"Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits","author":"bhatkar","year":"2003","journal-title":"Usenix Security Symp"},{"key":"ref14","article-title":"Efficient Techniques for Comprehensive Protection from Memory Error Exploits","author":"bhatkar","year":"2005","journal-title":"Usenix Security Symp"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23364","article-title":"Leakage-resilient layout randomization for mobile devices","author":"braden","year":"2016","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"ref17","article-title":"The exploration and explotation of a sd memory card","author":"xobs","year":"2013","journal-title":"Chaos Computer Congress"},{"key":"ref18","volume":"50","author":"burow","year":"2018","journal-title":"Control-Flow Integrity Precision Security and Performance"},{"key":"ref19","article-title":"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity","author":"carlini","year":"2015","journal-title":"USENIX Security Symposium"},{"key":"ref4","year":"0","journal-title":"mbed OS"},{"key":"ref3","year":"0","journal-title":"FreeRToS Support Forum Stack overflow detection on Cortex-m3 with MPU"},{"key":"ref6","year":"0","journal-title":"STM32F4-Discovery"},{"key":"ref5","year":"0","journal-title":"STM32479I-EVAL"},{"key":"ref8","year":"2016","journal-title":"FreeRToS Support Forum Mistype in port c for GCC\/ARM_CM3_MPU"},{"key":"ref7","year":"0","journal-title":"The mbed OS u Visor"},{"key":"ref49","year":"2003","journal-title":"PaX Team PaX address space layout randomization (ASLR)"},{"key":"ref9","first-page":"340","article-title":"Control-flow integrity","author":"abadi","year":"2005","journal-title":"ACM Conf on Computer and Communications Security"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594295"},{"key":"ref45","article-title":"Embedded firmware diversity for smart electric meters","author":"mclaughlin","year":"2010","journal-title":"Proc Usenix Workshop Hot Topics in Security"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"ref47","article-title":"BEEBS: open benchmarks for energy measurements on embedded platforms","volume":"abs 1308 5174","author":"pallister","year":"2013","journal-title":"CoRR"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2159712"}],"event":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","location":"San Jose, CA, USA","start":{"date-parts":[[2017,5,22]]},"end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7957740\/7958557\/07958583.pdf?arnumber=7958583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T03:46:27Z","timestamp":1569555987000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7958583\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/sp.2017.37","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}