{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:44:10Z","timestamp":1743054250364,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819980239"},{"type":"electronic","value":"9789819980246"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8024-6_18","type":"book-chapter","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T05:02:11Z","timestamp":1704862931000},"page":"231-243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protecting Kernel Code Integrity with\u00a0PMP on\u00a0RISC-V"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6364-9085","authenticated-orcid":false,"given":"Seon","family":"Ha","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4513-1034","authenticated-orcid":false,"given":"Hyungon","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,11]]},"reference":[{"key":"18_CR1","unstructured":"RISC-V proxy kernel and boot loader (2023). https:\/\/github.com\/riscv-software-src\/riscv-pk"},{"key":"18_CR2","unstructured":"Spike RISC-V ISA simulator (2023). https:\/\/github.com\/riscv-software-src\/riscv-isa-sim"},{"key":"18_CR3","unstructured":"Asanovic, K., et al.: The rocket chip generator. Technical report. UCB\/EECS-2016-17, EECS Department, University of California, Berkeley (2016). http:\/\/www2.eecs.berkeley.edu\/Pubs\/TechRpts\/2016\/EECS-2016-17.html"},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Dautenhahn, N., Kasampalis, T., Dietz, W., Criswell, J., Adve, V.: Nested kernel: an operating system architecture for intra-kernel privilege separation. In: International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2015, pp. 191\u2013206. Association for Computing Machinery, New York (2015). https:\/\/doi.org\/10.1145\/2694344.2694386","DOI":"10.1145\/2694344.2694386"},{"key":"18_CR5","unstructured":"Ge, X., Vijayakumar, H., Jaeger, T.: SPROBES: enforcing kernel code integrity on the trustzone architecture. CoRR abs\/1410.7747 (2014). http:\/\/arxiv.org\/abs\/1410.7747"},{"key":"18_CR6","doi-asserted-by":"publisher","unstructured":"Ha, S., Yu, M., Moon, H., Lee, J.: Kernel code integrity protection at the physical address level on RISC-V. IEEE Access (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3285876","DOI":"10.1109\/ACCESS.2023.3285876"},{"key":"18_CR7","doi-asserted-by":"publisher","unstructured":"Hwang, D., Yang, M., Jeon, S., Lee, Y., Kwon, D., Paek, Y.: RiskiM: toward complete kernel protection with hardware support. In: 2019 Design, Automation Test in Europe Conference Exhibition (DATE), Germany, pp. 740\u2013745. IEEE (2019). https:\/\/doi.org\/10.23919\/DATE.2019.8715277","DOI":"10.23919\/DATE.2019.8715277"},{"key":"18_CR8","unstructured":"Intel: Intel(r) supervisor mode execution protection (SMEP). https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-sdm.html"},{"key":"18_CR9","unstructured":"Lee, J.: ARM: support for the PXN CPU feature on ARMV7 (2014). https:\/\/patchwork.kernel.org\/project\/linux-arm-kernel\/patch\/1414259997-9350-1-git-send-email-js07.lee@gmail.com\/"},{"key":"18_CR10","unstructured":"McVoy, L., Staelin, C.: LMbench: portable tools for performance analysis. In: USENIX Annual Technical Conference, ATEC 1996, USA, p. 230. USENIX Association (1996)"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Moon, H., Lee, J., Hwang, D., Jung, S., Seo, J., Paek, Y.: Architectural supports to protect OS kernels from code-injection attacks and their applications. ACM Trans. Des. Autom. Electron. Syst. 23(1) (2017). https:\/\/doi.org\/10.1145\/3110223","DOI":"10.1145\/3110223"},{"key":"18_CR12","unstructured":"SauriklT, L.: Cydia substrate (2022). http:\/\/www.cydiasubstrate.com\/"},{"key":"18_CR13","doi-asserted-by":"publisher","unstructured":"Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2007, pp. 335\u2013350. Association for Computing Machinery, New York (2007). https:\/\/doi.org\/10.1145\/1294261.1294294","DOI":"10.1145\/1294261.1294294"},{"key":"18_CR14","unstructured":"Siguza: KTRR (2018). https:\/\/blog.siguza.net\/KTRR\/"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Vogl, S., Pfoh, J., Kittel, T., Eckert, C.: Persistent data-only malware: function hooks without code. In: NDSS, USA, pp. 1\u201316. Internet Society (2014)","DOI":"10.14722\/ndss.2014.23019"},{"key":"18_CR16","unstructured":"Waterman, A., Asanovic, K.: The RISC-V Instruction Set Manual Volume II. The RISC-V Foundation (2017). https:\/\/riscv.org\/wp-content\/uploads\/2017\/05\/riscv-privileged-v1.10.pdf"},{"key":"18_CR17","unstructured":"xerub: Tick (FPU) tock (IRQ) (2017). https:\/\/xerub.github.io\/ios\/kpp\/2017\/04\/13\/tick-tock.html"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8024-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T05:03:59Z","timestamp":1704863039000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8024-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819980239","9789819980246"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8024-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wisa.or.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}