{"id":"https://openalex.org/W2537014044","doi":"https://doi.org/10.1145/2976749.2978406","title":"Drammer","display_name":"Drammer","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2537014044","doi":"https://doi.org/10.1145/2976749.2978406","mag":"2537014044"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978406","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://vvdveen.com/publications/drammer.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004487846","display_name":"Victor van der Veen","orcid":null},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Victor van der Veen","raw_affiliation_strings":["Vrije Universiteit Amsterdam, Amsterdam, Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002695158","display_name":"Yanick Fratantonio","orcid":"https://orcid.org/0009-0008-3676-9117"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yanick Fratantonio","raw_affiliation_strings":["UC Santa Barbara, Santa Barbara, CA, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"UC Santa Barbara, Santa Barbara, CA, USA","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009694552","display_name":"Martina Lindorfer","orcid":"https://orcid.org/0000-0001-7001-4481"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Martina Lindorfer","raw_affiliation_strings":["UC Santa Barbara, Santa Barbara, CA, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"UC Santa Barbara, Santa Barbara, CA, USA","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066874310","display_name":"Daniel Gruss","orcid":"https://orcid.org/0000-0002-7977-3246"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Daniel Gruss","raw_affiliation_strings":["Graz University of Technology, Vienna, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Vienna, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013155428","display_name":"Cl\u00e9mentine Maurice","orcid":"https://orcid.org/0000-0002-8896-9494"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Clementine Maurice","raw_affiliation_strings":["Graz University of Technology, Vienna, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Vienna, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075685499","display_name":"Giovanni Vigna","orcid":"https://orcid.org/0000-0002-3422-5369"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Giovanni Vigna","raw_affiliation_strings":["UC Santa Barbara, Santa Barbara, CA, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"UC Santa Barbara, Santa Barbara, CA, USA","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029566823","display_name":"Herbert Bos","orcid":"https://orcid.org/0000-0001-6179-1510"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Herbert Bos","raw_affiliation_strings":["Vrije Universiteit Amsterdam, Amsterdam, Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082033768","display_name":"Kaveh Razavi","orcid":"https://orcid.org/0000-0002-8588-7100"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Kaveh Razavi","raw_affiliation_strings":["Vrije Universiteit Amsterdam, Amsterdam, Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083941826","display_name":"Cristiano Giuffrida","orcid":"https://orcid.org/0000-0002-8329-5929"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Cristiano Giuffrida","raw_affiliation_strings":["Vrije Universiteit Amsterdam, Amsterdam, Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5004487846"],"corresponding_institution_ids":["https://openalex.org/I865915315"],"apc_list":null,"apc_paid":null,"fwci":47.2644,"has_fulltext":true,"cited_by_count":293,"citation_normalized_percentile":{"value":0.99809344,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1675","last_page":"1689"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/x86","display_name":"x86","score":0.7858940958976746},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6029931902885437},{"id":"https://openalex.org/keywords/allocator","display_name":"Allocator","score":0.5337173938751221},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.51127028465271},{"id":"https://openalex.org/keywords/pointer","display_name":"Pointer (user interface)","score":0.458530068397522},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.44862961769104004},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.4340248107910156},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.42963409423828125},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3543669581413269},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2854633927345276},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.22838953137397766},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.14666897058486938},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08948570489883423}],"concepts":[{"id":"https://openalex.org/C170723468","wikidata":"https://www.wikidata.org/wiki/Q182933","display_name":"x86","level":3,"score":0.7858940958976746},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6029931902885437},{"id":"https://openalex.org/C162262903","wikidata":"https://www.wikidata.org/wiki/Q343527","display_name":"Allocator","level":2,"score":0.5337173938751221},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.51127028465271},{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.458530068397522},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.44862961769104004},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.4340248107910156},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.42963409423828125},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3543669581413269},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2854633927345276},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22838953137397766},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.14666897058486938},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08948570489883423},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2976749.2978406","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:research.vu.nl:openaire_cris_publications/8eeaabf1-92e1-4860-8cfe-a249aaa0b31c","is_oa":false,"landing_page_url":"https://research.vu.nl/en/publications/8eeaabf1-92e1-4860-8cfe-a249aaa0b31c","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Van Der Veen, V, Fratantonio, Y, Lindorfer, M, Gruss, D, Maurice, C, Vigna, G, Bos, H, Razavi, K & Giuffrida, C 2016, Drammer : Deterministic Rowhammer attacks on mobile platforms. in CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. vol. 24-28-October-2016, Association for Computing Machinery (ACM), pp. 1675-1689, 23rd ACM Conference on Computer and Communications Security, CCS 2016, Vienna, Austria, 24/10/16. https://doi.org/10.1145/2976749.2978406","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:research.vu.nl:publications/8eeaabf1-92e1-4860-8cfe-a249aaa0b31c","is_oa":true,"landing_page_url":"https://hdl.handle.net/1871.1/8eeaabf1-92e1-4860-8cfe-a249aaa0b31c","pdf_url":"https://vvdveen.com/publications/drammer.pdf","source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Van Der Veen, V, Fratantonio, Y, Lindorfer, M, Gruss, D, Maurice, C, Vigna, G, Bos, H, Razavi, K & Giuffrida, C 2016, Drammer : Deterministic Rowhammer attacks on mobile platforms. in CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. vol. 24-28-October-2016, Association for Computing Machinery (ACM), pp. 1675-1689, 23rd ACM Conference on Computer and Communications Security, CCS 2016, Vienna, Austria, 24/10/16. https://doi.org/10.1145/2976749.2978406","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:research.vu.nl:publications/8eeaabf1-92e1-4860-8cfe-a249aaa0b31c","is_oa":true,"landing_page_url":"https://hdl.handle.net/1871.1/8eeaabf1-92e1-4860-8cfe-a249aaa0b31c","pdf_url":"https://vvdveen.com/publications/drammer.pdf","source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Van Der Veen, V, Fratantonio, Y, Lindorfer, M, Gruss, D, Maurice, C, Vigna, G, Bos, H, Razavi, K & Giuffrida, C 2016, Drammer : Deterministic Rowhammer attacks on mobile platforms. in CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. vol. 24-28-October-2016, Association for Computing Machinery (ACM), pp. 1675-1689, 23rd ACM Conference on Computer and Communications Security, CCS 2016, Vienna, Austria, 24/10/16. https://doi.org/10.1145/2976749.2978406","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2028336889","display_name":null,"funder_award_id":"610436","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G3153804520","display_name":"HARDWARE ENABLED CRYPTO AND RANDOMNESS","funder_award_id":"644052","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G4638008297","display_name":null,"funder_award_id":"CNS-1408632","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6045381192","display_name":"TWC: TTP Option: Medium: Collaborative: Identifying and Mitigating Trust Violations in the Smartphone Ecosystem","funder_award_id":"1408632","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6656422411","display_name":null,"funder_award_id":"N00014-15-1-2948","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G667776622","display_name":"Secure Hardware-Software Architectures for Robust Computing Systems","funder_award_id":"644571","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G7973152879","display_name":null,"funder_award_id":"644052","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G8876996369","display_name":null,"funder_award_id":"N00014","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"},{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2537014044.pdf","grobid_xml":"https://content.openalex.org/works/W2537014044.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1447175589","https://openalex.org/W1914991993","https://openalex.org/W1983592013","https://openalex.org/W2094619820","https://openalex.org/W2097243222","https://openalex.org/W2101281312","https://openalex.org/W2124608923","https://openalex.org/W2157116240","https://openalex.org/W2163563130","https://openalex.org/W2193198328","https://openalex.org/W2329308213","https://openalex.org/W2420049379","https://openalex.org/W2474699623","https://openalex.org/W2491829854","https://openalex.org/W2505343551","https://openalex.org/W2516668814","https://openalex.org/W2534511085","https://openalex.org/W2914982603","https://openalex.org/W2964118667","https://openalex.org/W2964206587","https://openalex.org/W6639989532","https://openalex.org/W6675598778","https://openalex.org/W6720296912","https://openalex.org/W6723169266"],"related_works":["https://openalex.org/W4252124899","https://openalex.org/W4250204977","https://openalex.org/W2043640140","https://openalex.org/W2122690624","https://openalex.org/W4361194010","https://openalex.org/W4312676584","https://openalex.org/W4213255458","https://openalex.org/W2390958073","https://openalex.org/W2155316957","https://openalex.org/W1607259217"],"abstract_inverted_index":{"Recent":[0],"work":[1,51,150],"shows":[2],"that":[3,74,85,142],"the":[4,106,122,156],"Rowhammer":[5,61,76,145,162],"hardware":[6],"bug":[7],"can":[8],"be":[9,88],"used":[10],"to":[11,40,135],"craft":[12],"powerful":[13],"attacks":[14,29,62,77],"and":[15,55,84,154],"completely":[16],"subvert":[17],"a":[18,130],"system.":[19],"However,":[20],"existing":[21],"efforts":[22],"either":[23],"describe":[24],"probabilistic":[25],"(and":[26,34],"thus":[27],"unreliable)":[28],"or":[30],"rely":[31],"on":[32,63,80,105,119,151],"special":[33,96],"often":[35],"unavailable)":[36],"memory":[37,47,97,108,114],"management":[38,98],"features":[39],"place":[41],"victim":[42],"objects":[43],"in":[44],"vulnerable":[45],"physical":[46,113],"locations.":[48],"Moreover,":[49],"prior":[50],"only":[52],"targets":[53],"x86":[54],"researchers":[56],"have":[57],"openly":[58],"wondered":[59],"whether":[60],"other":[64,136],"architectures,":[65],"such":[66],"as":[67],"ARM,":[68],"are":[69,78],"even":[70],"possible.":[71],"We":[72,116],"show":[73,141],"deterministic":[75],"feasible":[79],"commodity":[81],"mobile":[82,152,161],"platforms":[83,153],"they":[86],"cannot":[87],"mitigated":[89],"by":[90],"current":[91],"defenses.":[92],"Rather":[93],"than":[94],"assuming":[95],"features,":[99],"our":[100,125,133],"attack,":[101,126],"DRAMMER,":[102],"solely":[103],"relies":[104],"predictable":[107],"reuse":[109],"patterns":[110],"of":[111,124,132],"standard":[112],"allocators.":[115],"implement":[117],"DRAMMER":[118],"Android/ARM,":[120],"demonstrating":[121],"practicability":[123],"but":[127],"also":[128],"discuss":[129],"generalization":[131],"approach":[134],"Linux-based":[137],"platforms.":[138],"Furthermore,":[139],"we":[140],"traditional":[143],"x86-based":[144],"exploitation":[146],"techniques":[147],"no":[148],"longer":[149],"address":[155],"resulting":[157],"challenges":[158],"towards":[159],"practical":[160],"attacks.":[163]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":27},{"year":2024,"cited_by_count":19},{"year":2023,"cited_by_count":22},{"year":2022,"cited_by_count":34},{"year":2021,"cited_by_count":39},{"year":2020,"cited_by_count":42},{"year":2019,"cited_by_count":46},{"year":2018,"cited_by_count":36},{"year":2017,"cited_by_count":24},{"year":2016,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2016-10-28T00:00:00"}
