{"id":"https://openalex.org/W4312381597","doi":"https://doi.org/10.1109/tdsc.2022.3214666","title":"<i>Implicit Hammer</i>: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses","display_name":"<i>Implicit Hammer</i>: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses","publication_year":2022,"publication_date":"2022-10-14","ids":{"openalex":"https://openalex.org/W4312381597","doi":"https://doi.org/10.1109/tdsc.2022.3214666"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2022.3214666","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3214666","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100410710","display_name":"Zhi Zhang","orcid":"https://orcid.org/0000-0003-3604-5369"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Zhi Zhang","raw_affiliation_strings":["Data61, CSIRO, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014677031","display_name":"He Wei","orcid":"https://orcid.org/0000-0001-9434-5218"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei He","raw_affiliation_strings":["SKLOIS, Institute of Information Engineering, CAS, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLOIS, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047799795","display_name":"Yueqiang Cheng","orcid":"https://orcid.org/0000-0002-6277-340X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yueqiang Cheng","raw_affiliation_strings":["NIO, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"NIO, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100390305","display_name":"Wenhao Wang","orcid":"https://orcid.org/0000-0001-7294-2724"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenhao Wang","raw_affiliation_strings":["Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101863680","display_name":"Yansong Gao","orcid":"https://orcid.org/0000-0001-5783-2172"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yansong Gao","raw_affiliation_strings":["School of Computer Science and Engineering, NanJing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, NanJing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004490190","display_name":"Dongxi Liu","orcid":"https://orcid.org/0000-0002-0221-2571"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dongxi Liu","raw_affiliation_strings":["Data61, CSIRO, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100457005","display_name":"Kang Li","orcid":"https://orcid.org/0009-0004-0844-122X"},"institutions":[{"id":"https://openalex.org/I98301712","display_name":"Baidu (China)","ror":"https://ror.org/03vs3wt56","country_code":"CN","type":"company","lineage":["https://openalex.org/I98301712"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kang Li","raw_affiliation_strings":["Baidu Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Baidu Security, Beijing, China","institution_ids":["https://openalex.org/I98301712"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["Data61, CSIRO, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048592388","display_name":"Anmin Fu","orcid":"https://orcid.org/0000-0002-1632-5737"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anmin Fu","raw_affiliation_strings":["School of Computer Science and Engineering, NanJing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, NanJing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100458990","display_name":"Yi Zou","orcid":"https://orcid.org/0000-0002-4382-4670"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Zou","raw_affiliation_strings":["School of Microelectronics, South China University of Technology, Guangzhou, China","Pazhou Lab, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Microelectronics, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]},{"raw_affiliation_string":"Pazhou Lab, Guangzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":10,"corresponding_author_ids":["https://openalex.org/A5100410710"],"corresponding_institution_ids":["https://openalex.org/I1292875679","https://openalex.org/I42894916"],"apc_list":null,"apc_paid":null,"fwci":1.9893,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.88529895,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"20","issue":"5","first_page":"3716","last_page":"3733"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hammer","display_name":"Hammer","score":0.7758055925369263},{"id":"https://openalex.org/keywords/dram","display_name":"Dram","score":0.6726005673408508},{"id":"https://openalex.org/keywords/row","display_name":"Row","score":0.6552504897117615},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5493294596672058},{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.5286684036254883},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4824943542480469},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4200814366340637},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.4174423813819885},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.31472933292388916},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23042899370193481},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1729343831539154},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.15609067678451538},{"id":"https://openalex.org/keywords/structural-engineering","display_name":"Structural engineering","score":0.13925734162330627},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.11564379930496216}],"concepts":[{"id":"https://openalex.org/C13655849","wikidata":"https://www.wikidata.org/wiki/Q25294","display_name":"Hammer","level":2,"score":0.7758055925369263},{"id":"https://openalex.org/C7366592","wikidata":"https://www.wikidata.org/wiki/Q1255620","display_name":"Dram","level":2,"score":0.6726005673408508},{"id":"https://openalex.org/C135598885","wikidata":"https://www.wikidata.org/wiki/Q1366302","display_name":"Row","level":2,"score":0.6552504897117615},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5493294596672058},{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.5286684036254883},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4824943542480469},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4200814366340637},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.4174423813819885},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.31472933292388916},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23042899370193481},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1729343831539154},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.15609067678451538},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.13925734162330627},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.11564379930496216},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2022.3214666","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3214666","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8199999928474426}],"awards":[{"id":"https://openalex.org/G5663473917","display_name":null,"funder_award_id":"62072239","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6203212911","display_name":null,"funder_award_id":"61802397","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7884758391","display_name":null,"funder_award_id":"62002167","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W1597555784","https://openalex.org/W1934458198","https://openalex.org/W1954144304","https://openalex.org/W1964281299","https://openalex.org/W2056073317","https://openalex.org/W2061354941","https://openalex.org/W2157116240","https://openalex.org/W2163563130","https://openalex.org/W2255548496","https://openalex.org/W2296602564","https://openalex.org/W2329308213","https://openalex.org/W2420049379","https://openalex.org/W2489077495","https://openalex.org/W2516668814","https://openalex.org/W2525431465","https://openalex.org/W2537014044","https://openalex.org/W2612454599","https://openalex.org/W2625267941","https://openalex.org/W2795222486","https://openalex.org/W2795231660","https://openalex.org/W2807401673","https://openalex.org/W2868863044","https://openalex.org/W2889199359","https://openalex.org/W2926775434","https://openalex.org/W2961531859","https://openalex.org/W2962726564","https://openalex.org/W2962832225","https://openalex.org/W2963311060","https://openalex.org/W2974891422","https://openalex.org/W2979333187","https://openalex.org/W3015367674","https://openalex.org/W3015685940","https://openalex.org/W3016266693","https://openalex.org/W3042829099","https://openalex.org/W3046609696","https://openalex.org/W3092001024","https://openalex.org/W3094572750","https://openalex.org/W3102933117","https://openalex.org/W3104711117","https://openalex.org/W3131080843","https://openalex.org/W3214385046","https://openalex.org/W4245425914","https://openalex.org/W4288057787","https://openalex.org/W4288057800","https://openalex.org/W6720892955","https://openalex.org/W6723169266","https://openalex.org/W6725368715","https://openalex.org/W6744009158","https://openalex.org/W6753251892","https://openalex.org/W6753443810","https://openalex.org/W6753951102","https://openalex.org/W6754306559","https://openalex.org/W6756176480","https://openalex.org/W6766549611","https://openalex.org/W6768346712","https://openalex.org/W6775956099","https://openalex.org/W6790802987"],"related_works":["https://openalex.org/W2374086689","https://openalex.org/W3176279093","https://openalex.org/W2373945265","https://openalex.org/W2370203001","https://openalex.org/W1912565424","https://openalex.org/W4246410201","https://openalex.org/W1968505275","https://openalex.org/W2959939328","https://openalex.org/W2503982731","https://openalex.org/W2950041399"],"abstract_inverted_index":{"Rowhammer":[0,25],"is":[1,47,142,148],"a":[2,91,130,149,185],"hardware":[3,180],"vulnerability":[4],"in":[5,18,152,215],"DRAM":[6,168],"memory,":[7],"where":[8],"repeated":[9],"access":[10,53,104],"to":[11,54,98,103,136,145,160,188,194,203,220],"hammer":[12,61,81,105,137,197,207],"rows":[13,82,89,106,138],"can":[14,208],"induce":[15],"bit":[16],"flips":[17],"neighboring":[19],"<italic":[20,41],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[21,42],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">victim":[22],"rows</i>":[23],".":[24],"attacks":[26,46,67,154],"have":[27,52,231],"enabled":[28],"privilege":[29,158],"escalation,":[30],"sandbox":[31],"escape,":[32],"cryptographic":[33],"key":[34,38],"disclosures,":[35],"etc.":[36],"A":[37],"requirement":[39],"of":[40,58,86,178,227],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">all</i>":[43],"existing":[44],"rowhammer":[45,66,153,162],"that":[48,133,139],"an":[49,59,163],"attacker":[50,141],"must":[51],"at":[55],"least":[56],"part":[57],"exploitable":[60],"row.":[62],"We":[63,126,183],"term":[64],"such":[65],"as":[68],"Explicit":[69],"Hammer.":[70],"Recently,":[71],"several":[72],"proposals":[73],"leverage":[74],"the":[75,79,84,87,100,120,140,191,210,225],"spatial":[76],"proximity":[77],"between":[78],"accessed":[80],"and":[83,198,218,239],"location":[85],"victim":[88],"for":[90],"defense":[92],"against":[93],"rowhammer.":[94],"These":[95],"all":[96],"aim":[97],"deny":[99],"attacker's":[101],"permission":[102],"near":[107],"sensitive":[108],"data,":[109],"thus":[110],"defeating":[111],"explicit":[112,199,204],"hammer-based":[113],"attacks.":[114],"In":[115],"this":[116],"paper,":[117],"we":[118,230],"question":[119],"core":[121],"assumption":[122],"underlying":[123],"these":[124],"defenses.":[125],"present":[127],"Implicit":[128],"Hammer,":[129],"confused-deputy":[131],"attack":[132],"causes":[134],"accesses":[135,171],"not":[143],"allowed":[144],"access.":[146],"It":[147],"paradigm":[150],"shift":[151],"since":[155],"it":[156],"crosses":[157],"boundary":[159],"stealthily":[161],"inaccessible":[164],"row":[165],"by":[166,174],"implicit":[167,196,206,228,234],"accesses.":[169],"Such":[170],"are":[172],"achieved":[173],"abusing":[175],"inherent":[176],"features":[177],"modern":[179],"and/or":[181],"software.":[182],"propose":[184],"generic":[186],"model":[187],"rigorously":[189],"formalize":[190],"necessary":[192],"conditions":[193],"initiate":[195],"hammer,":[200,205,229],"respectively.":[201],"Compared":[202],"defeat":[209],"advanced":[211],"software-only":[212],"defenses,":[213],"stealthy":[214],"hiding":[216],"itself":[217],"hard":[219],"be":[221],"mitigated.":[222],"To":[223],"demonstrate":[224],"practicality":[226],"created":[232],"two":[233],"hammer's":[235],"instances,":[236],"called":[237],"PThammer":[238],"SyscallHammer.":[240]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
