{"id":"https://openalex.org/W2562625553","doi":"https://doi.org/10.1109/memcod.2016.7797764","title":"SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC","display_name":"SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2562625553","doi":"https://doi.org/10.1109/memcod.2016.7797764","mag":"2562625553"},"language":"en","primary_location":{"id":"doi:10.1109/memcod.2016.7797764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/memcod.2016.7797764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 ACM/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053280523","display_name":"Manaar Alam","orcid":"https://orcid.org/0000-0002-3338-2944"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Manaar Alam","raw_affiliation_strings":["IIT Kharagpur, Secured Embedded Architecture Laboratory, India"],"affiliations":[{"raw_affiliation_string":"IIT Kharagpur, Secured Embedded Architecture Laboratory, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102710760","display_name":"Debapriya Basu Roy","orcid":"https://orcid.org/0000-0003-4664-5237"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debapriya Basu Roy","raw_affiliation_strings":["IIT Kharagpur, Secured Embedded Architecture Laboratory, India"],"affiliations":[{"raw_affiliation_string":"IIT Kharagpur, Secured Embedded Architecture Laboratory, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101816833","display_name":"Sarani Bhattacharya","orcid":"https://orcid.org/0000-0002-4190-2671"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sarani Bhattacharya","raw_affiliation_strings":["IIT Kharagpur, Secured Embedded Architecture Laboratory, India"],"affiliations":[{"raw_affiliation_string":"IIT Kharagpur, Secured Embedded Architecture Laboratory, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032484999","display_name":"Vidya Govindan","orcid":null},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vidya Govindan","raw_affiliation_strings":["IIT Kharagpur, Secured Embedded Architecture Laboratory, India"],"affiliations":[{"raw_affiliation_string":"IIT Kharagpur, Secured Embedded Architecture Laboratory, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049426113","display_name":"Rajat Subhra Chakraborty","orcid":"https://orcid.org/0000-0003-3588-163X"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajat Subhra Chakraborty","raw_affiliation_strings":["IIT Kharagpur, Secured Embedded Architecture Laboratory, India"],"affiliations":[{"raw_affiliation_string":"IIT Kharagpur, Secured Embedded Architecture Laboratory, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078971402","display_name":"Debdeep Mukhopadhyay","orcid":"https://orcid.org/0000-0002-6499-8346"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debdeep Mukhopadhyay","raw_affiliation_strings":["IIT Kharagpur, Secured Embedded Architecture Laboratory, India"],"affiliations":[{"raw_affiliation_string":"IIT Kharagpur, Secured Embedded Architecture Laboratory, India","institution_ids":["https://openalex.org/I145894827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5053280523"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":1.7139,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.8951181,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9735999703407288,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9065548181533813},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8212144374847412},{"id":"https://openalex.org/keywords/buffer-overflow","display_name":"Buffer overflow","score":0.7845133543014526},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.6476693749427795},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5990758538246155},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5413287878036499},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5101564526557922},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.44220787286758423},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4040467143058777},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.10216867923736572},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.08375576138496399}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9065548181533813},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8212144374847412},{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.7845133543014526},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.6476693749427795},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5990758538246155},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5413287878036499},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5101564526557922},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.44220787286758423},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4040467143058777},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.10216867923736572},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.08375576138496399}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/memcod.2016.7797764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/memcod.2016.7797764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 ACM/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1989060313","https://openalex.org/W2160418053","https://openalex.org/W2165266180","https://openalex.org/W2517176850","https://openalex.org/W2978757628","https://openalex.org/W3151891900"],"related_works":["https://openalex.org/W107132618","https://openalex.org/W1972760175","https://openalex.org/W2887198767","https://openalex.org/W4233969565","https://openalex.org/W4283264706","https://openalex.org/W4387360145","https://openalex.org/W1515699938","https://openalex.org/W946883631","https://openalex.org/W2390718939","https://openalex.org/W1994367926"],"abstract_inverted_index":{"Buffer":[0],"overflow":[1],"and":[2,68,83,98,105],"stack":[3],"smashing":[4],"have":[5,18,23,60,69,91,99],"been":[6,19],"one":[7],"of":[8,95,103,114],"the":[9,62,75,126],"most":[10],"popular":[11,127],"software":[12,128],"based":[13],"vulnerabilities":[14,26,73],"in":[15,66,74],"literature.":[16],"There":[17],"multiple":[20],"works":[21],"which":[22],"used":[24],"these":[25,96,120],"to":[27,31,37,46,52,109],"induce":[28],"powerful":[29],"attacks":[30,55,121],"trigger":[32],"malicious":[33],"code":[34],"snippets":[35],"or":[36],"achieve":[38],"privilege":[39],"escalation.":[40],"In":[41],"this":[42],"work,":[43],"we":[44],"attempt":[45],"implement":[47],"hardware":[48,106,116],"level":[49,107,117,129],"security":[50,124],"enforcement":[51],"mitigate":[53],"such":[54],"on":[56],"OpenRISC":[57],"architecture.":[58],"We":[59,90],"analyzed":[61],"given":[63],"exploits":[64,97],"[5]":[65],"detail":[67],"identified":[70],"two":[71],"major":[72],"exploit":[76],"codes:":[77],"memory":[78],"corruption":[79],"by":[80,87],"non-secure":[81],"memcpy()":[82],"return":[84],"address":[85],"modification":[86,108],"buffer":[88],"overflow.":[89],"individually":[92],"addressed":[93],"each":[94],"proposed":[100],"a":[101],"combination":[102],"compiler":[104],"prevent":[110],"them.":[111],"The":[112],"advantage":[113],"having":[115],"protection":[118],"against":[119,125],"provides":[122],"reliable":[123],"countermeasures.":[130]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
