Through the Window: On the exploitability of Xtensa's Register Window Overflow | IEEE Conference Publication | IEEE Xplore