{"id":"https://openalex.org/W4409561648","doi":"https://doi.org/10.1109/lats65346.2025.10963939","title":"Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core","display_name":"Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core","publication_year":2025,"publication_date":"2025-03-11","ids":{"openalex":"https://openalex.org/W4409561648","doi":"https://doi.org/10.1109/lats65346.2025.10963939"},"language":"en","primary_location":{"id":"doi:10.1109/lats65346.2025.10963939","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lats65346.2025.10963939","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 26th Latin American Test Symposium (LATS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026533978","display_name":"Cristiano Pegoraro Chenet","orcid":"https://orcid.org/0000-0003-3974-9310"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Politecnico di Torino","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Cristiano Pegoraro Chenet","raw_affiliation_strings":["Politecnico di Torino,Control and Computer Eng. Dep.,Torino,Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino,Control and Computer Eng. Dep.,Torino,Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065582630","display_name":"Alessandro Savino","orcid":"https://orcid.org/0000-0003-0529-7950"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Politecnico di Torino","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alessandro Savino","raw_affiliation_strings":["Politecnico di Torino,Control and Computer Eng. Dep.,Torino,Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino,Control and Computer Eng. Dep.,Torino,Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026593274","display_name":"Stefano Di Carlo","orcid":"https://orcid.org/0000-0002-7512-5356"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Politecnico di Torino","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Stefano Di Carlo","raw_affiliation_strings":["Politecnico di Torino,Control and Computer Eng. Dep.,Torino,Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino,Control and Computer Eng. Dep.,Torino,Italy","institution_ids":["https://openalex.org/I177477856"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026533978"],"corresponding_institution_ids":["https://openalex.org/I177477856"],"apc_list":null,"apc_paid":null,"fwci":1.4129,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.78871142,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7384957671165466},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6323744058609009},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5678079128265381},{"id":"https://openalex.org/keywords/stack","display_name":"Stack (abstract data type)","score":0.5615355968475342},{"id":"https://openalex.org/keywords/buffer-overflow","display_name":"Buffer overflow","score":0.5590069890022278},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.46822139620780945},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.4525354504585266},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4232838749885559},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.4174099564552307}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7384957671165466},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6323744058609009},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5678079128265381},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.5615355968475342},{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.5590069890022278},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.46822139620780945},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4525354504585266},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4232838749885559},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.4174099564552307}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lats65346.2025.10963939","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lats65346.2025.10963939","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 26th Latin American Test Symposium (LATS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3822624842","display_name":null,"funder_award_id":"PE00000014","funder_id":"https://openalex.org/F7311471023","funder_display_name":"NextGenerationEU"},{"id":"https://openalex.org/G382373986","display_name":null,"funder_award_id":"101093062","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F7311471023","display_name":"NextGenerationEU","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W201766245","https://openalex.org/W1968519345","https://openalex.org/W2058315483","https://openalex.org/W2082137964","https://openalex.org/W2088503757","https://openalex.org/W2122646361","https://openalex.org/W2296719434","https://openalex.org/W2602229646","https://openalex.org/W2625408821","https://openalex.org/W2950774332","https://openalex.org/W2963255460","https://openalex.org/W3007346474","https://openalex.org/W3161833296","https://openalex.org/W3183826413","https://openalex.org/W4200106037","https://openalex.org/W4205225601","https://openalex.org/W4229053127","https://openalex.org/W4232751114","https://openalex.org/W4243563432","https://openalex.org/W4254182148","https://openalex.org/W4384026339","https://openalex.org/W4392563522","https://openalex.org/W4392944935","https://openalex.org/W4394827107","https://openalex.org/W4404564756","https://openalex.org/W6768779726"],"related_works":["https://openalex.org/W2479612266","https://openalex.org/W2097492617","https://openalex.org/W2180474751","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574"],"abstract_inverted_index":{"The":[0,81],"RISC-V":[1,41,59,110],"architecture":[2],"has":[3],"become":[4],"increasingly":[5],"popular":[6],"due":[7],"to":[8,17,31,36,64],"its":[9],"open-source":[10],"nature":[11],"and":[12],"flexibility,":[13],"making":[14],"it":[15],"susceptible":[16],"various":[18],"security":[19,39,54,104],"attacks,":[20],"such":[21],"as":[22],"Stack":[23],"Buffer":[24],"Overflow":[25],"(SBO)":[26],"attacks.":[27],"It":[28],"is":[29],"crucial":[30],"effectively":[32],"detect":[33],"these":[34,53,87],"attacks":[35,75],"ensure":[37],"the":[38,57,66,84,103],"of":[40,68,86,106],"systems.":[42],"This":[43],"study":[44],"explores":[45],"Hardware-Supported":[46],"Malware":[47],"Detection":[48],"(HMD)":[49],"techniques":[50],"for":[51,101],"identifying":[52],"threats.":[55],"Using":[56],"CV32e40p":[58],"platform,":[60],"we":[61],"conducted":[62],"simulations":[63],"assess":[65],"effectiveness":[67],"anomaly-based":[69],"HMD":[70,107],"methods":[71],"in":[72,94,109],"detecting":[73],"SBO":[74],"by":[76],"analyzing":[77],"hardware":[78],"microarchitectural":[79],"events.":[80],"findings":[82],"demonstrate":[83],"potential":[85],"approaches":[88],"but":[89],"also":[90],"reveal":[91],"significant":[92],"challenges":[93],"detection":[95],"performance.":[96],"These":[97],"elements":[98],"are":[99],"essential":[100],"advancing":[102],"capabilities":[105],"systems":[108],"environments.":[111]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
