{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T14:40:27Z","timestamp":1759848027680,"version":"3.44.0"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/socc46988.2019.1570564307","type":"proceedings-article","created":{"date-parts":[[2020,5,7]],"date-time":"2020-05-07T21:27:28Z","timestamp":1588886848000},"page":"418-423","source":"Crossref","is-referenced-by-count":16,"title":["ITUS: A Secure RISC-V System-on-Chip"],"prefix":"10.1109","author":[{"given":"Vinay B. Y.","family":"Kumar","sequence":"first","affiliation":[{"name":"Nanyang Technological University,Singapore"}]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,Singapore"}]},{"given":"Jawad","family":"Haj-Yahya","sequence":"additional","affiliation":[{"name":"Agency for Science, Technology and Research (A&#x002A;STAR),Singapore"}]},{"given":"Avi","family":"Mendelson","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,Singapore"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"journal-title":"ARM Security Technology Building A Secure System Using TrustZone Technology","year":"0","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3214292.3214298"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23271"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2018.8351649"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2008.17"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2018.8605643"},{"key":"ref34","article-title":"Sanctorum: A lightweight security monitor for secure enclaves","volume":"abs 1812 10605","author":"lebedev","year":"2018","journal-title":"CoRR"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_29"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1561\/1000000051"},{"key":"ref11","article-title":"Rsa key extraction via lowbandwidth acoustic cryptanalysis","author":"genkin","year":"2013","journal-title":"Cryptology EPrint Archive Report 2013\/496"},{"key":"ref12","article-title":"Xmss and embedded systems - xmss hardware accelerators for risc-v","author":"wang","year":"2018","journal-title":"Cryptology ePrint Archive Report 2018\/1225"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2018.00118"},{"journal-title":"Threshold implementations of gift A trade-off analysis","year":"2017","author":"gupta","key":"ref14"},{"journal-title":"Physical one-way functions","year":"2001","author":"ravikanth","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.238"},{"key":"ref18","article-title":"Secure boot and remote attestation in the sanctum processor","author":"lebedev","year":"2018","journal-title":"Cryptology ePrint Archive Report 2018\/427"},{"key":"ref19","article-title":"Modeling attacks on physical unclonable functions","author":"rhrmair","year":"2010","journal-title":"Cryptology EPrint Archive Report 2010\/499"},{"key":"ref28","article-title":"Meltdown","author":"lipp","year":"2018","journal-title":"arXiv preprint arXiv 1801 01000"},{"article-title":"Benchmarking amd fx vs. intel sandy\/ivy bridge cpus following spectre, meltdown, l1tf, zombieload","year":"0","author":"larabel","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SAMOS.2017.8344637"},{"key":"ref3","article-title":"Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution","author":"van bulck","year":"2018","journal-title":"Proceedings of the 27th USENIX Security Symposium"},{"key":"ref6","article-title":"Spectre is here to stay: An analysis of side-channels and speculative execution","volume":"abs 1902 5178","author":"mcilroy","year":"2019","journal-title":"CoRR"},{"key":"ref29","article-title":"Spectre attacks: Exploiting speculative execution","author":"kocher","year":"2018","journal-title":"arXiv preprint 1801 01203"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978321"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.21236\/ADA605735"},{"journal-title":"Tagged memory and minion cores in the lowRISC SoC","year":"2014","author":"bradbury","key":"ref7"},{"key":"ref2","first-page":"973","article-title":"Meltdown: Reading kernel memory from user space","author":"lipp","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"journal-title":"The RISC-V instruction set manual volume II privileged architecture version 1 9","year":"2016","author":"waterman","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2019.00080"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2016.2553027"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2018.00045"},{"key":"ref48","article-title":"RAPPER: ransomware prevention via performance counters","volume":"abs 1802 3909","author":"alam","year":"2018","journal-title":"CoRR"},{"key":"ref22","article-title":"Intel sgx explained","author":"costan","year":"2016","journal-title":"Cryptology ePrint Archive Report 2006\/086"},{"key":"ref47","article-title":"Sanctorum: A lightweight security monitor for secure enclaves","volume":"abs 1812 10605","author":"lebedev","year":"2018","journal-title":"CoRR"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495550"},{"key":"ref42","article-title":"MI6: secure enclaves in a speculative out-of-order processor","volume":"abs 1812 9822","author":"bourgeat","year":"2018","journal-title":"CoRR"},{"key":"ref24","article-title":"Rambleed: Reading bits in memory without accessing them","author":"kwong","year":"2020","journal-title":"IEEE symposium on security and privacy (S&P)"},{"journal-title":"Keystone An open framework for architecting trusted execution environments","year":"2018","author":"lee","key":"ref41"},{"key":"ref23","article-title":"Trust issues: Exploiting trustzone tees","author":"beniamini","year":"2017","journal-title":"Google Project Zero Blog"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2687463"},{"article-title":"Unified extensible firmware interface specification: Version 2.2 d","year":"2010","author":"efi","key":"ref26"},{"journal-title":"Cryptomanager root of trust rt600 and rt700 series product brief","year":"2019","key":"ref43"},{"key":"ref25","article-title":"Formally verified hardware\/software co-design for remote attestation","volume":"abs 1811 175","author":"eldefrawy","year":"2018","journal-title":"CoRR"}],"event":{"name":"2019 32nd IEEE International System-on-Chip Conference (SOCC)","start":{"date-parts":[[2019,9,3]]},"location":"Singapore","end":{"date-parts":[[2019,9,6]]}},"container-title":["2019 32nd IEEE International System-on-Chip Conference (SOCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9083732\/9087941\/09088035.pdf?arnumber=9088035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T19:28:20Z","timestamp":1756754900000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9088035\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/socc46988.2019.1570564307","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}