{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:23:11Z","timestamp":1740169391542,"version":"3.37.3"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3443509","type":"journal-article","created":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T17:39:59Z","timestamp":1723657199000},"page":"114008-114022","source":"Crossref","is-referenced-by-count":0,"title":["A Hardware-Based Correct Execution Environment Supporting Virtual Memory"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9351-842X","authenticated-orcid":false,"given":"Daehyeon","family":"Lee","sequence":"first","affiliation":[{"name":"School of Cybersecurity, Korea University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1187-2991","authenticated-orcid":false,"given":"Ohsuk","family":"Shin","sequence":"additional","affiliation":[{"name":"School of Cybersecurity, Korea University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0035-3660","authenticated-orcid":false,"given":"Yeonghyeon","family":"Cha","sequence":"additional","affiliation":[{"name":"School of Cybersecurity, Korea University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0733-0136","authenticated-orcid":false,"given":"Junghee","family":"Lee","sequence":"additional","affiliation":[{"name":"School of Cybersecurity, Korea University, Seoul, South Korea"}]},{"given":"Taisic","family":"Yun","sequence":"additional","affiliation":[{"name":"Graduate School of Information Security, Korea Advanced Institute of Science and Technology, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2953-7883","authenticated-orcid":false,"given":"Jihye","family":"Kim","sequence":"additional","affiliation":[{"name":"Electronics and Information System Engineering Major, Kookmin University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9044-7441","authenticated-orcid":false,"given":"Hyunok","family":"Oh","sequence":"additional","affiliation":[{"name":"Department of Information System, Hanyang University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6389-6068","authenticated-orcid":false,"given":"Chrysostomos","family":"Nicopoulos","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Cyprus, Nicosia, Cyprus"}]},{"given":"Sang Su","family":"Lee","sequence":"additional","affiliation":[{"name":"Cyber Security Research Division, ETRI, Daejeon, South Korea"}]}],"member":"263","reference":[{"volume-title":"AMD SEV-SNP: Strengthening VM Isolation With Integrity Protection and More","year":"2020","key":"ref1"},{"article-title":"Intel SGX explained","year":"2016","author":"Costan","key":"ref2"},{"key":"ref3","article-title":"On the TOCTOU problem in remote attestation","author":"De Oliveira Nunes","year":"2020","journal-title":"arXiv:2005.03873"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3158363"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00018"},{"key":"ref6","first-page":"781","article-title":"Succinct non-interactive zero knowledge for a von Neumann architecture","volume-title":"Proc. 23rd USENIX Secur. Symp. (USENIX Secur.)","author":"Ben-Sasson"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041308"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383885"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00077"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806658"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062276"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240821"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052983"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.38"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"ref20","first-page":"1","article-title":"SMART: Secure and minimal architecture for (establishing dynamic) root of trust","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS)","volume":"12","author":"Defrawy"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196526"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098260"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3079763"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2622261"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2019.00018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA\/IUCC.2017.00062"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240814"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"ref31","first-page":"2111","article-title":"Privacy and integrity preserving computations with CRISP","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Security)","author":"Chatel"},{"key":"ref32","first-page":"1429","article-title":"VRASED: A verified hardware\/software co-design for remote attestation","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Security)","author":"Nunes"},{"key":"ref33","first-page":"917","article-title":"Vale: Verifying high-performance cryptographic assembly code","volume-title":"Proc. 26th USENIX Secur. Symp. (USENIX Security)","author":"Bond"},{"key":"ref34","first-page":"765","article-title":"TRUESET: Faster Verifiable set computations","volume-title":"Proc. 23rd USENIX Secur. Symp. (USENIX Security)","author":"Kosba"},{"key":"ref35","first-page":"479","article-title":"Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base","volume-title":"Proc. 22nd USENIX Secur. Symp. (USENIX Security)","author":"Noorman"},{"key":"ref36","first-page":"253","article-title":"Taking proof-based verified computation a few steps closer to practicality","volume-title":"Proc. 21st USENIX Secur. Symp. (USENIX Security)","author":"Setty"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833792"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00114"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.23"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.48"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133984"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134017"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978368"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516681"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046759"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2897619"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2778504"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2762345"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1084805.1084812"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.28"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-016-0221-0"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978335"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939938"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196544"},{"key":"ref58","first-page":"857","article-title":"Sanctum: Minimal hardware extensions for strong software isolation","volume-title":"Proc. 25th USENIX Secur. Symp. (USENIX Security)","author":"Costan"},{"volume-title":"Operating System Interface","year":"2023","key":"ref59"},{"volume-title":"Sha256 Implementation in Verilog","year":"2021","author":"Iani","key":"ref60"},{"volume-title":"RSA Cryptosystem Implementation in Verilog","year":"2016","author":"Singh","key":"ref61"},{"volume-title":"SPEC CPU 2017","year":"2017","key":"ref62"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10636152.pdf?arnumber=10636152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T10:27:35Z","timestamp":1725013655000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10636152\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3443509","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}