{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:21:50Z","timestamp":1757625710200,"version":"3.44.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031998560"},{"type":"electronic","value":"9783031998577"}],"license":[{"start":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:00:00Z","timestamp":1755907200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:00:00Z","timestamp":1755907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-99857-7_10","type":"book-chapter","created":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:16:39Z","timestamp":1755839799000},"page":"132-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ParTEE: A Framework for\u00a0Secure Parallel Computing of\u00a0RISC-V Trusted Execution Environments"],"prefix":"10.1007","author":[{"given":"Hao","family":"Lan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ziang","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qi","family":"Zhu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Yan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qinfen","family":"Hao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaochun","family":"Ye","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yong","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ninghui","family":"Sun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,8,23]]},"reference":[{"key":"10_CR1","unstructured":"Asanovic, K., et\u00a0al.: The rocket chip generator. EECS Department, University of California, Berkeley, Technical Report. UCB\/EECS-2016-17 4, 6\u20132 (2016)"},{"key":"10_CR2","unstructured":"Bahmani, R., et al.: CURE: a security architecture with CUstomizable and resilient enclaves. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 1073\u20131090. USENIX Association (2021). https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/bahmani"},{"key":"10_CR3","unstructured":"Costan, V.: Intel sgx explained. IACR Cryptol. EPrint Arch. (2016)"},{"key":"10_CR4","unstructured":"Costan, V., Lebedev, I., Devadas, S.: Sanctum: minimal hardware extensions for strong software isolation. In: Proceedings of the 25th USENIX Conference on Security Symposium, SEC\u201916, pp. 857\u2013874. USENIX Association (2016)"},{"key":"10_CR5","unstructured":"Feng, E., et al.: Scalable memory protection in the PENGLAI enclave. In: 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21), pp. 275\u2013294. USENIX Association (2021). https:\/\/www.usenix.org\/conference\/osdi21\/presentation\/feng"},{"key":"10_CR6","unstructured":"Gu, J., Zhu, B., Li, M., Li, W., Xia, Y., Chen, H.: A hardware-software co-design for efficient intra-enclave isolation. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 3129\u20133145. USENIX Association, Boston (2022). https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/gu-jinyu"},{"key":"10_CR7","unstructured":"Kaminsky, S.: Secure multi-threading in keystone enclaves (2021)"},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Lee, D., Kohlbrenner, D., Shinde, S., Asanovi\u0107, K., Song, D.: Keystone: an open framework for architecting trusted execution environments. In: Proceedings of the Fifteenth European Conference on Computer Systems. EuroSys \u201920. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3342195.3387532","DOI":"10.1145\/3342195.3387532"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Li, Z., Li, W., Xia, Y., Zang, B.: Teep: supporting secure parallel processing in arm trustzone. In: 2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS), pp. 544\u2013553 (2020).https:\/\/doi.org\/10.1109\/ICPADS51040.2020.00076","DOI":"10.1109\/ICPADS51040.2020.00076"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Liu, Z., Luo., Y., Duan, S., Zhou, T., Xu, X.: Mirrornet: a tee-friendly framework for secure on-device dnn inference. In: 2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD), pp.\u00a01\u20139 (2023). https:\/\/doi.org\/10.1109\/ICCAD57390.2023.10323746","DOI":"10.1109\/ICCAD57390.2023.10323746"},{"key":"10_CR11","unstructured":"riscv\/opensbi: Risc-v open source supervisor binary interface (2020). https:\/\/github.com\/riscv\/opensbi"},{"key":"10_CR12","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems, vol.\u00a030. Curran Associates, Inc. (2017). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/file\/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdf"},{"key":"10_CR13","unstructured":"Waterman, A., Lee, Y., Avizienis, R., Patterson, D.A., Asanovic, K.: The risc-v instruction set manual volume ii: Privileged architecture version 1.7. EECS Department, University of California, Berkeley, Technical Report. UCB\/EECS-2015-49 (2015)"},{"issue":"2","key":"10_CR14","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/225830.223990","volume":"23","author":"SC Woo","year":"1995","unstructured":"Woo, S.C., Ohara, M., Torrie, E., Singh, J.P., Gupta, A.: The splash-2 programs: characterization and methodological considerations. ACM SIGARCH Comput. Arch. News 23(2), 24\u201336 (1995)","journal-title":"ACM SIGARCH Comput. Arch. News"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Zhang, Z., ET AL.: No privacy left outside: on the (in-)security of tee-shielded dnn partition for on-device ml. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 3327\u20133345 (2024). https:\/\/doi.org\/10.1109\/SP54263.2024.00052","DOI":"10.1109\/SP54263.2024.00052"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2025: Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-99857-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T19:08:52Z","timestamp":1757444932000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-99857-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,23]]},"ISBN":["9783031998560","9783031998577"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-99857-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,8,23]]},"assertion":[{"value":"23 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that there is no competing interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"Euro-Par","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dresden","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"europar2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.euro-par.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}