{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T00:54:07Z","timestamp":1772499247943,"version":"3.50.1"},"reference-count":75,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/samos.2017.8344637","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T19:33:43Z","timestamp":1524512023000},"page":"253-260","source":"Crossref","is-referenced-by-count":11,"title":["Survey of secure processors"],"prefix":"10.1109","author":[{"given":"Suman","family":"Sau","sequence":"first","affiliation":[]},{"given":"Jawad","family":"Haj-Yahya","sequence":"additional","affiliation":[]},{"given":"Ming Ming","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Kwok Yan","family":"Lam","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref72","first-page":"105","article-title":"Address obfuscation: an efficient approach to combat a broad range of memory error exploits","author":"bhatkar","year":"2003","journal-title":"Proceedings of the 12th USENIX Security Symposium"},{"key":"ref71","article-title":"Bypassing pax aslr protection","author":"durden","year":"2002","journal-title":"Phrack Magazine"},{"key":"ref70","article-title":"How to use a 64-bit virtual address space","author":"chase","year":"1992","journal-title":"Department of Computer Science and Engineering University of Washington Citeseer"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1145\/2508148.2485971","article-title":"Design space exploration and optimization of path oblivious RAM in secure processors","volume":"41","author":"ren","year":"2013","journal-title":"SIGARCH Comput Archit News"},{"key":"ref39","first-page":"223","article-title":"Design and implementation of a TCG-based integrity measurement architecture","volume":"13","author":"sailer","year":"2004","journal-title":"USENIX Security Symposium"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"ref33","article-title":"Intel software guard extensions (Intel sgx)","author":"anati","year":"2015","journal-title":"Tutorial at International Symposium on Computer Architecture (ISCA) IEEE Computer Society"},{"key":"ref32","article-title":"The android source code: Trusty tee","year":"2016","journal-title":"Android Open Source Project"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1145\/1357010.1352625","article-title":"Flicker: An execution infrastructure for tcb minimization","volume":"42","author":"mccune","year":"2008","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"ref30","first-page":"2","article-title":"Docker: lightweight linux containers for consistent development and deployment","volume":"2014","author":"merkel","year":"2014","journal-title":"Linux Journal"},{"key":"ref37","author":"efi","year":"2010","journal-title":"Unified Extensible Firmware Interface Specification Version 2 2d"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_10"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2954331"},{"key":"ref34","article-title":"Intel-64 and IA-32 architectures software developer's manual","volume":"1","year":"2014","journal-title":"Volume 3A System Programming Guide"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITechnol.2012.6285774"},{"key":"ref62","author":"josyula","year":"2001","journal-title":"Empowering Side-channel Attacks"},{"key":"ref61","first-page":"251","author":"gandolfi","year":"2001","journal-title":"Electromagnetic analysis Concrete results"},{"key":"ref63","first-page":"13","author":"chari","year":"2003","journal-title":"Template Attacks"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451146"},{"key":"ref64","first-page":"173","author":"fahn","year":"1999","journal-title":"IPA A New Class of Power Attacks"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1145\/1165389.945463","article-title":"Implementing an untrusted operating system on trusted hardware","volume":"37","author":"lie","year":"2003","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"ref65","first-page":"37","author":"boneh","year":"1997","journal-title":"On the Importance of Checking Cryptographic Protocols for Faults"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","article-title":"Differential fault analysis of secret key cryptosystems","author":"biham","year":"1997","journal-title":"Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology CRYPTO '97"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346267"},{"key":"ref67","first-page":"293","author":"dusart","year":"2003","journal-title":"Differential fault analysis on A E S"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"ref69","article-title":"ASLR on the Line: Practical Cache Attacks on the MMU","author":"gras","year":"2017","journal-title":"NDSS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPOT.2008.930448"},{"key":"ref20","article-title":"The trusted execution environment: Delivering enhanced security at a lower cost to the mobile market","author":"platform","year":"2011","journal-title":"White Paper"},{"key":"ref22","author":"group","year":"2011","journal-title":"TPM Main Specification Level 2 Version 1 2 Revision 103"},{"key":"ref21","year":"0","journal-title":"TEE system architecture"},{"key":"ref24","article-title":"Using hardware-enabled trusted crypto to thwart advanced threats","author":"pescatore","year":"2015","journal-title":"Sans Institute Infosec Reading Room"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1201\/9781420059823-c10","article-title":"Hardware security modules","author":"smith","year":"2010","journal-title":"Handbook of Financial Cryptography and Security"},{"key":"ref26","article-title":"Arm security technology aAT building a secure system using trustzone technology","year":"2009","journal-title":"ARM"},{"key":"ref25","author":"ekberg","year":"2013","journal-title":"Securing software architectures for trusted processor environments"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00587-9_4"},{"key":"ref51","article-title":"Trusted computing","author":"arbaugh","year":"2007","journal-title":"Department of Computer Science University of Maryland"},{"key":"ref59","first-page":"174","article-title":"A proposition for correlation power analysis enhancement","author":"le","year":"2006","journal-title":"Proceedings of the 8th International Conference on Cryptographic Hardware and Embedded Systems CHES'06"},{"key":"ref58","first-page":"16","author":"brier","year":"2004","journal-title":"Correlation Power Analysis with a Leakage Model"},{"key":"ref57","first-page":"388","author":"kocher","year":"1999","journal-title":"Differential power analysis"},{"key":"ref56","author":"kocher","year":"1998","journal-title":"Introduction to differential power analysis and related attacks"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"ref54","article-title":"Cache-timing attacks on AES","author":"daniel","year":"2005","journal-title":"Tech Rep"},{"key":"ref53","first-page":"167","article-title":"A practical implementation of the timing attack","author":"dhem","year":"1998","journal-title":"CARDIS '98 Third Smart Card Research and Advanced Application Conference"},{"key":"ref52","first-page":"104","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","author":"kocher","year":"1996","journal-title":"Advances in Cryptology-CRYPTO '96 16th Annual International Cryptology Conference"},{"key":"ref10","article-title":"Reconfigurable cryptographic processor","author":"hodjat","year":"2006","journal-title":"Proceedings Of The Workshop On Circuits Systems And Signal Processing (Prorise 2006)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2009.2013231"},{"key":"ref40","article-title":"TPM mobile with trusted execution environment for comprehensive mobile device security","year":"2010","journal-title":"Trusted Computing Group"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2004.11"},{"key":"ref13","first-page":"83","article-title":"Vectorized AES core for high-throughput secure environments","author":"pericas","year":"2008","journal-title":"International Conference on High Performance Computing for Computational Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488898"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2008.76"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2003.1213181"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2012.111"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2010.38"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19475-7_5"},{"key":"ref4","article-title":"Cryptoblaze: 8-bit security microcontroller","year":"2003","journal-title":"CoolRunner-II"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1023833.1023873"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2005.1466189"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2004.1399180"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71817-0_9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"ref49","article-title":"Verified boot on chrome os and how to do it yourself","author":"glass","year":"2013","journal-title":"Proceedings of Embedded Linux Conference Europe"},{"key":"ref9","article-title":"Intel&#x00AE; advanced encryption standard (AES) new instructions set","author":"gueron","year":"2010","journal-title":"Intel Corporation"},{"key":"ref46","author":"zimmer","year":"2010","journal-title":"Beyond BIOS Developing with the Unified Extensible Firmware Interface"},{"key":"ref45","article-title":"Client specific implementation specification for conventional bios","volume":"1","year":"2012","journal-title":"Version I Specification"},{"key":"ref48","author":"glass","year":"2013","journal-title":"Verified u-boot"},{"key":"ref47","author":"pearson","year":"2003","journal-title":"Trusted Computing Platforms TCPA Technology in Context"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2611399"},{"key":"ref41","first-page":"305","article-title":"The digital distributed system security architecture","author":"gasser","year":"1989","journal-title":"Proceedings of the 12th National Computer Security Conference"},{"key":"ref44","author":"group","year":"2014","journal-title":"TPM 2 0 main specification family 2 0 level 00 revision 01 16"},{"key":"ref43","article-title":"OSLO: Improving the security of trusted computing","volume":"7","author":"kauer","year":"2007","journal-title":"Usenix Security"}],"event":{"name":"2017 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS)","location":"Pythagorion, Greece","start":{"date-parts":[[2017,7,17]]},"end":{"date-parts":[[2017,7,20]]}},"container-title":["2017 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337645\/8344598\/08344637.pdf?arnumber=8344637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T02:59:04Z","timestamp":1643165944000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8344637\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":75,"URL":"https:\/\/doi.org\/10.1109\/samos.2017.8344637","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}