{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T10:35:06Z","timestamp":1762166106875,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":40,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819510207"},{"type":"electronic","value":"9789819510214"}],"license":[{"start":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T00:00:00Z","timestamp":1762214400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T00:00:00Z","timestamp":1762214400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-1021-4_26","type":"book-chapter","created":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T10:28:52Z","timestamp":1762165732000},"page":"352-366","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LASM: A Lightweight and\u00a0General TEE Secure Monitor Framework"],"prefix":"10.1007","author":[{"given":"Baojun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tingting","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tianyi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Huandong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Changbin","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Longbing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,4]]},"reference":[{"key":"26_CR1","unstructured":"Darkhttpd. https:\/\/unix4lyfe.org\/darkhttpd\/"},{"key":"26_CR2","unstructured":"Openssl. https:\/\/www.openssl.org\/"},{"key":"26_CR3","unstructured":"Unixbench. https:\/\/github.com\/kdlucas\/byte-unixbench\/"},{"key":"26_CR4","unstructured":"Ali, U., Omar, H., Ma, C., Garg, V., Khan, O.: Hardware root-of-trust implementations in trusted execution environments. Cryptology ePrint Archive (2023)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Azab, A.M., Ning, P., Shah, J., Chen, Q., Bhutkar, R., Ganesh, G., et\u00a0al.: Hypervision across worlds: real-time kernel protection from the arm trustzone secure world. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 90\u2013102 (2014)","DOI":"10.1145\/2660267.2660350"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Azab, A.M., Swidowski, K., Bhutkar, R., Ma, J., Shen, W., Wang, R., et\u00a0al.: Skee: a lightweight secure kernel-level execution environment for arm. In: NDSS, vol.\u00a016, pp. 21\u201324 (2016)","DOI":"10.14722\/ndss.2016.23009"},{"key":"26_CR7","unstructured":"Bahmani, R., Brasser, F., Dessouky, G., Jauernig, P., Klimmek, M., Sadeghi, A.R., et\u00a0al.: $$\\{$$CURE$$\\}$$: a security architecture with $$\\{$$CUstomizable$$\\}$$ and resilient enclaves. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 1073\u20131090 (2021)"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Bai, Y., Li, P., Huang, Y., Huang, M.C., Zhao, S., Zhao, L., et\u00a0al.: Hypertee: a decoupled tee architecture with secure enclave management. In: 2024 57th IEEE\/ACM International Symposium on Microarchitecture (MICRO), pp. 105\u2013120. IEEE (2024)","DOI":"10.1109\/MICRO61859.2024.00018"},{"key":"26_CR9","unstructured":"Bellard, F.: Qemu, a fast and portable dynamic translator. In: USENIX Annual Technical Conference. FREENIX Track, California, USA, vol. 41, pp. 10\u20135555 (2005)"},{"issue":"4","key":"26_CR10","first-page":"882","volume":"44","author":"ST Bhosale","year":"2015","unstructured":"Bhosale, S.T., Patil, T., Patil, P.: Sqlite: light database system. Int. J. Comput. Sci. Mob. Comput. 44(4), 882\u2013885 (2015)","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Brasser, F., Gens, D., Jauernig, P., Sadeghi, A.R., Stapf, E.: Sanctuary: arming trustzone with user-space enclaves. In: NDSS (2019)","DOI":"10.14722\/ndss.2019.23448"},{"key":"26_CR12","unstructured":"Cai, Z., Zhu, J., Shen, W., Yang, Y., Chang, R., Wang, Y., et\u00a0al.: Demystifying pointer authentication on apple m1. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 2833\u20132848 (2023)"},{"key":"26_CR13","unstructured":"Chen, X., Li, Z., Jain, T., Narayanan, V., Burtsev, A.: Limitations and opportunities of modern hardware isolation mechanisms. In: 2024 USENIX Annual Technical Conference (USENIX ATC 24), pp. 349\u2013368 (2024)"},{"key":"26_CR14","unstructured":"Constable, S., Van\u00a0Bulck, J., Cheng, X., Xiao, Y., Xing, C., , et\u00a0al.: $$\\{$$AEX-Notify$$\\}$$: thwarting precise $$\\{$$Single-Stepping$$\\}$$ attacks through interrupt awareness for intel $$\\{$$SGX$$\\}$$ enclaves. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 4051\u20134068 (2023)"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Dautenhahn, N., Kasampalis, T., Dietz, W., Criswell, J., Adve, V.: Nested kernel: an operating system architecture for intra-kernel privilege separation. In: Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 191\u2013206 (2015)","DOI":"10.1145\/2694344.2694386"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Davi, L., Gens, D., Liebchen, C., Sadeghi, A.R.: Pt-rand: practical mitigation of data-only attacks against page tables. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23421"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Du, D., Yang, B., Xia, Y., Chen, H.: Accelerating extra dimensional page walks for confidential computing. In: Proceedings of the 56th Annual IEEE\/ACM International Symposium on Microarchitecture, pp. 654\u2013669 (2023)","DOI":"10.1145\/3613424.3614293"},{"key":"26_CR18","unstructured":"Feng, E., Lu, X., Du, D., Yang, B., Jiang, X., Xia, Y., et\u00a0al.: Scalable memory protection in the $$\\{$$PENGLAI$$\\}$$ enclave. In: 15th $$\\{$$USENIX$$\\}$$ Symposium on Operating Systems Design and Implementation ($$\\{$$OSDI$$\\}$$ 21), pp. 275\u2013294 (2021)"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Han, S.K., Jang, J.: Mytee: own the trusted execution environment on embedded devices. In: NDSS (2023)","DOI":"10.14722\/ndss.2023.23041"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Hunt, G.D., Pai, R., Le, M.V., Jamjoom, H., Bhattiprolu, S., Boivie, R., et\u00a0al.: Confidential computing for openpower. In: Proceedings of the Sixteenth European Conference on Computer Systems, pp. 294\u2013310 (2021)","DOI":"10.1145\/3447786.3456243"},{"key":"26_CR21","unstructured":"Jia, Y., Liu, S., Wang, W., Chen, Y., Zhai, Z., Yan, S., et\u00a0al.: $$\\{$$HyperEnclave$$\\}$$: an open and cross-platform trusted execution environment. In: 2022 USENIX Annual Technical Conference (USENIX ATC 22), pp. 437\u2013454 (2022)"},{"key":"26_CR22","unstructured":"Kaplan, D.: Amd x86 memory encryption technologies. In: 25th USENIX Security Symposium (2016)"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Kuvaiskii, D., Stavrakakis, D., Qin, K., Xing, C., Bhatotia, P., Vij, M.: Gramine-tdx: a lightweight os kernel for confidential vms. In: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pp. 4598\u20134612 (2024)","DOI":"10.1145\/3658644.3690323"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Lee, D., Kohlbrenner, D., Shinde, S., Asanovi\u0107, K., Song, D.: Keystone: an open framework for architecting trusted execution environments. In: Proceedings of the Fifteenth European Conference on Computer Systems, pp. 1\u201316 (2020)","DOI":"10.1145\/3342195.3387532"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Li, M., Yang, Y., Chen, G., Yan, M., Zhang, Y.: Sok: understanding design choices and pitfalls of trusted execution environments. In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1600\u20131616 (2024)","DOI":"10.1145\/3634737.3644993"},{"key":"26_CR26","unstructured":"Li, X., Li, X., Dall, C., Gu, R., Nieh, J., Sait, Y., et\u00a0al.: Design and verification of the arm confidential compute architecture. In: 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22), pp. 465\u2013484 (2022)"},{"key":"26_CR27","unstructured":"Limited, A.: Arm trustzone for aarch64 architecture. https:\/\/documentation-service.arm.com\/static\/636e33404e6cf12278ad8ced"},{"key":"26_CR28","unstructured":"Limited, A.: Learn the architecture: arm confidential compute architecture software stack. https:\/\/documentation-service.arm.com\/static\/64a28a02df6cd61d528c3b81"},{"key":"26_CR29","unstructured":"Mark, K., Stavros, V., Shweta, S.: Dorami: privilege separating security monitor on risc-v tees. In: 34th USENIX Security Symposium (USENIX Security 25) (2025)"},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"McKeen, F., Alexandrovich, I., Berenzon, A., Rozas, C.V., Shafi, H., Shanbhogue, V., et\u00a0al.: Innovative instructions and software model for isolated execution. Hasp@ isca 10(1) (2013)","DOI":"10.1145\/2487726.2488368"},{"key":"26_CR31","doi-asserted-by":"crossref","unstructured":"Nasahl, P., Schilling, R., Werner, M., Mangard, S.: Hector-v: a heterogeneous cpu architecture for a secure risc-v execution environment. In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, pp. 187\u2013199 (2021)","DOI":"10.1145\/3433210.3453112"},{"key":"26_CR32","doi-asserted-by":"crossref","unstructured":"Paju, A., Javed, M.O., Nurmi, J., Savim\u00e4ki, J., McGillion, B., Brumley, B.B.: Sok: a systematic review of tee usage for developing trusted applications. In: Proceedings of the 18th International Conference on Availability, Reliability and Security, pp. 1\u201315 (2023)","DOI":"10.1145\/3600160.3600169"},{"key":"26_CR33","unstructured":"Sev-Snp, A.: Strengthening vm isolation with integrity protection and more. White Paper, January 53(2020), 1450\u20131465 (2020)"},{"key":"26_CR34","doi-asserted-by":"crossref","unstructured":"Tan, W., et\u00a0al.: Ptstore: lightweight architectural support for page table isolation. In: 2023 60th ACM\/IEEE Design Automation Conference (DAC), pp.\u00a01\u20136. IEEE (2023)","DOI":"10.1109\/DAC56929.2023.10247657"},{"key":"26_CR35","unstructured":"TrustVisor, M.: Trustvisor: efficient tcb reduction and attestation (2010)"},{"issue":"2","key":"26_CR36","first-page":"16","volume":"60","author":"H Weiwu","year":"2023","unstructured":"Weiwu, H., Wenxiang, W., Ruiyang, W., Huandong, W., Lu, Z., Chenghua, X., et al.: Loongson instruction set architecture technology. J. Comput. Res. Dev 60(2), 16 (2023)","journal-title":"J. Comput. Res. Dev"},{"key":"26_CR37","doi-asserted-by":"crossref","unstructured":"Xu, J., Xie, M., Wu, C., Zhang, Y., Li, Q., Huang, X., et\u00a0al.: Panic: pan-assisted intra-process memory isolation on arm. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 919\u2013933 (2023)","DOI":"10.1145\/3576915.3623206"},{"key":"26_CR38","doi-asserted-by":"crossref","unstructured":"Xu, Y., Cui, W., Peinado, M.: Controlled-channel attacks: deterministic side channels for untrusted operating systems. In: 2015 IEEE Symposium on Security and Privacy, pp. 640\u2013656. IEEE (2015)","DOI":"10.1109\/SP.2015.45"},{"key":"26_CR39","unstructured":"Zhang, Y., Hu, Y., Ning, Z., Zhang, F., Luo, X., Huang, H., et\u00a0al.: $$\\{$$SHELTER$$\\}$$: extending arm $$\\{$$CCA$$\\}$$ with isolation in user space. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 6257\u20136274 (2023)"},{"key":"26_CR40","doi-asserted-by":"crossref","unstructured":"Zhong, B., Zeng, Q.: Secpt: providing efficient page table protection based on smap feature in an untrusted commodity kernel. In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 215\u2013223. IEEE (2021)","DOI":"10.1109\/TrustCom53373.2021.00045"}],"container-title":["Lecture Notes in Computer Science","Advanced Parallel Processing Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-1021-4_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T10:29:02Z","timestamp":1762165742000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-1021-4_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,4]]},"ISBN":["9789819510207","9789819510214"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-1021-4_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,11,4]]},"assertion":[{"value":"4 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Advanced Parallel Processing Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"appt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.appt-conference.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}