{"id":"https://openalex.org/W4391182418","doi":"https://doi.org/10.1109/asianhost59942.2023.10409308","title":"When Memory Mappings Attack: On the (Mis)use of the ARM Cortex-M FPB Unit","display_name":"When Memory Mappings Attack: On the (Mis)use of the ARM Cortex-M FPB Unit","publication_year":2023,"publication_date":"2023-12-13","ids":{"openalex":"https://openalex.org/W4391182418","doi":"https://doi.org/10.1109/asianhost59942.2023.10409308"},"language":"en","primary_location":{"id":"doi:10.1109/asianhost59942.2023.10409308","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost59942.2023.10409308","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076364292","display_name":"Haoqi Shan","orcid":"https://orcid.org/0000-0003-1440-1828"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Haoqi Shan","raw_affiliation_strings":["CertiK"],"affiliations":[{"raw_affiliation_string":"CertiK","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069563170","display_name":"Dean Sullivan","orcid":"https://orcid.org/0000-0002-7186-4346"},"institutions":[{"id":"https://openalex.org/I179093154","display_name":"University of New Hampshire at Manchester","ror":"https://ror.org/04pvpk743","country_code":"US","type":"education","lineage":["https://openalex.org/I179093154"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dean Sullivan","raw_affiliation_strings":["University of New Hampshire"],"affiliations":[{"raw_affiliation_string":"University of New Hampshire","institution_ids":["https://openalex.org/I179093154"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014413722","display_name":"Orlando Arias","orcid":"https://orcid.org/0009-0002-3948-5773"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Orlando Arias","raw_affiliation_strings":["University of Massachusetts, Lowell"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts, Lowell","institution_ids":["https://openalex.org/I133738476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076364292"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1751,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.59802093,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"98","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/arm-architecture","display_name":"ARM architecture","score":0.8128277063369751},{"id":"https://openalex.org/keywords/microcontroller","display_name":"Microcontroller","score":0.7648154497146606},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.7259294986724854},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7061614990234375},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.7030519247055054},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6390872001647949},{"id":"https://openalex.org/keywords/flash-memory","display_name":"Flash memory","score":0.5165494680404663},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38268357515335083},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2302647829055786}],"concepts":[{"id":"https://openalex.org/C26771161","wikidata":"https://www.wikidata.org/wiki/Q16980","display_name":"ARM architecture","level":2,"score":0.8128277063369751},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.7648154497146606},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.7259294986724854},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7061614990234375},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.7030519247055054},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6390872001647949},{"id":"https://openalex.org/C2776531357","wikidata":"https://www.wikidata.org/wiki/Q174077","display_name":"Flash memory","level":2,"score":0.5165494680404663},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38268357515335083},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2302647829055786},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asianhost59942.2023.10409308","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost59942.2023.10409308","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2004456327","https://openalex.org/W2075095478","https://openalex.org/W2118810451","https://openalex.org/W2135274013","https://openalex.org/W2295234910","https://openalex.org/W2350778671","https://openalex.org/W2406423978","https://openalex.org/W2600258283","https://openalex.org/W2613412685","https://openalex.org/W2645364470","https://openalex.org/W2664781091","https://openalex.org/W2686848947","https://openalex.org/W2686866989","https://openalex.org/W2794073659","https://openalex.org/W6605051096","https://openalex.org/W6632329290","https://openalex.org/W6636991409","https://openalex.org/W6713987737"],"related_works":["https://openalex.org/W4321442002","https://openalex.org/W2015265939","https://openalex.org/W3176369637","https://openalex.org/W2978026406","https://openalex.org/W2399091034","https://openalex.org/W1999657508","https://openalex.org/W2376668782","https://openalex.org/W3207333805","https://openalex.org/W2617684781","https://openalex.org/W3163556586"],"abstract_inverted_index":{"In":[0,55,96],"recent":[1],"years":[2],"we":[3,81,98],"have":[4,58],"seen":[5],"an":[6,36],"explosion":[7],"in":[8,16,67,73,93,108,138,144],"the":[9,23,100,109],"usage":[10],"of":[11,25,27],"low-cost,":[12],"low-power":[13],"microcontrollers":[14],"(MCUs)":[15],"embedded":[17,70,127],"devices":[18],"around":[19],"us":[20],"due":[21],"to":[22,64,113,122],"popularity":[24],"Internet":[26],"Things":[28],"(IoT)":[29],"devices.":[30,128],"Although":[31],"this":[32,74],"is":[33],"good":[34],"from":[35],"economics":[37],"perspective,":[38],"it":[39],"has":[40],"also":[41],"been":[42],"detrimental":[43],"for":[44,126],"security":[45,66,140],"as":[46,132],"microcontroller-based":[47],"systems":[48],"are":[49],"now":[50],"a":[51,133,136],"viable":[52],"attack":[53,116],"target.":[54],"response,":[56],"researchers":[57],"developed":[59],"various":[60],"protection":[61],"mechanisms":[62],"dedicated":[63],"improve":[65],"these":[68,76],"resource-constrained":[69],"systems.We":[71],"demonstrate":[72],"paper":[75],"defenses":[77,125],"fall":[78],"short":[79],"when":[80],"leverage":[82],"benign":[83],"memory":[84],"mapped":[85],"design-for-debug":[86],"(DfD)":[87],"structures":[88,143],"added":[89],"by":[90],"MCU":[91],"vendors":[92],"their":[94],"products.":[95],"particular,":[97],"utilize":[99],"Flash":[101],"Patch":[102],"and":[103,135,141],"Breakpoint":[104],"(FPB)":[105],"unit":[106],"present":[107],"ARM":[110],"Cortex-M":[111],"family":[112],"build":[114],"new":[115],"primitives":[117],"which":[118],"can":[119],"be":[120],"used":[121],"bypass":[123],"common":[124],"Our":[129],"work":[130],"serves":[131],"warning":[134],"call":[137],"balancing":[139],"debug":[142],"modern":[145],"microcontrollers.":[146]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2024-01-25T00:00:00"}
