{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T19:36:56Z","timestamp":1767814616912,"version":"3.49.0"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172387"],"award-info":[{"award-number":["62172387"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"CCF-Phytium Fund 2023","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tcad.2025.3575014","type":"journal-article","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T13:51:25Z","timestamp":1749822685000},"page":"533-546","source":"Crossref","is-referenced-by-count":0,"title":["LayerTEE: Decoupled Memory Protection for Scalable Multilayer Communication on RISC-V"],"prefix":"10.1109","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7782-9541","authenticated-orcid":false,"given":"Shangjie","family":"Pan","sequence":"first","affiliation":[{"name":"SKLP, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yinghao","family":"Yang","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xuanyao","family":"Peng","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xiquan","family":"Zhao","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, Beijing, China"}]},{"given":"Dong","family":"Du","sequence":"additional","affiliation":[{"name":"Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6233-3538","authenticated-orcid":false,"given":"Hang","family":"Lu","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6558-5298","authenticated-orcid":false,"given":"Yubin","family":"Xia","sequence":"additional","affiliation":[{"name":"Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0874-814X","authenticated-orcid":false,"given":"Xiaowei","family":"Li","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24057"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2015.7322462"},{"key":"ref3","volume-title":"AMD Secure Encrypted Virtualization (SEV)","year":"2019"},{"key":"ref4","volume-title":"Virtex UltraScale+ VU19P","year":"2020"},{"key":"ref5","volume-title":"Vivado Design Suite","year":"2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387518"},{"key":"ref7","article-title":"The RISC-V instruction set manual volume II: Privileged architecture version 1.9","author":"Waterman","year":"2016"},{"key":"ref8","volume-title":"Confidential compute architecture.","year":"2022"},{"key":"ref9","first-page":"689","article-title":"{SCONE}: Secure Linux containers with Intel {SGX}","volume-title":"Proc. 12th USENIX Symp. Oper. Syst. Design Implement. (OSDI)","author":"Arnautov"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071066"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329827"},{"key":"ref13","first-page":"117","article-title":"{Can\u2019t} touch this: Software-only mitigation against rowhammer attacks targeting kernel memory","volume-title":"Proc. 26th USENIX Security. Symp. (USENIX Security.)","author":"Brasser"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23448"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988350"},{"key":"ref16","article-title":"The sky above the clouds","author":"Chasins","year":"2022","journal-title":"arXiv:2205.07147"},{"key":"ref17","volume-title":"rv8-bench: RISC-V benchmark suite","author":"Clark","year":"2023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00089"},{"key":"ref19","article-title":"Intel SGX explained","author":"Costan","year":"2016"},{"key":"ref20","first-page":"857","article-title":"Sanctum: Minimal hardware extensions for strong software isolation","volume-title":"Proc. 25th USENIX Security. Symp. (USENIX Security.)","author":"Costan"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387552"},{"key":"ref22","first-page":"195","article-title":"Fixing races for fun and profit: How to use access (2)","volume-title":"Proc. USENIX Security. Symp.","author":"Dean"},{"key":"ref23","first-page":"654","article-title":"Accelerating extra dimensional page walks for confidential computing","volume-title":"Proc. 56th Annu. IEEE\/ACM Int. Symp. Microarchit.","author":"Du"},{"key":"ref24","volume-title":"Penglai-enclave-sPMP","author":"Enclave","year":"2022"},{"key":"ref25","first-page":"275","article-title":"Scalable memory protection in the {PENGLAI} enclave","volume-title":"Proc. 15th {USENIX} Symp. Oper. Syst. Design Implement. (OSDI)","author":"Feng"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132782"},{"key":"ref27","volume-title":"RISC-V S-mode physical memory protection unit (SPMP)","year":"2022"},{"issue":"55","key":"ref28","first-page":"1","article-title":"FastCGI","volume":"1998","author":"Heinlein","year":"1998","journal-title":"Linux J."},{"issue":"5","key":"ref29","first-page":"967","article-title":"Enhancing data privacy and security in multi cloud environments","volume":"1","author":"Hossain","year":"2022","journal-title":"BULLET, Jurnal Multidisiplin Ilmu"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3231594"},{"key":"ref31","volume-title":"Intel TDX","year":"2020"},{"key":"ref32","first-page":"697","article-title":"{ZebRAM}: Comprehensive and compatible software protection against Rowhammer attacks","volume-title":"Proc. 13th USENIX Symp. Oper. Syst. Design Implement. (OSDI)","author":"Konoth"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00032"},{"key":"ref35","article-title":"Time efficient data migration among clouds","author":"Marium","year":"2018","journal-title":"arXiv:1810.04609"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.33022\/ijcs.v13i2.3811"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466628"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.011"},{"key":"ref40","volume-title":"NGINX content caching","year":"2021"},{"key":"ref41","first-page":"619","article-title":"Oblivious {multi-party} machine learning on trusted processors","volume-title":"Proc. 25th USENIX Security. Symp. (USENIX Security.)","author":"Ohrimenko"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3658617.3697763"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00069"},{"key":"ref44","volume-title":"Redis","year":"2024"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3875"},{"key":"ref46","article-title":"A survey and comparative study on multi-cloud architectures: Emerging issues and challenges for cloud federation","author":"Saxena","year":"2021","journal-title":"arXiv:2108.12831"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2016.2614497"},{"key":"ref48","first-page":"645","article-title":"{Graphene-SGX}: A practical library {OS} for unmodified applications on {SGX}","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC 17)","author":"Tsai"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-020-00404-w"},{"key":"ref50","volume-title":"Xiangshan-2 (nanhu) core","year":"2024"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00026"},{"key":"ref52","first-page":"4111","article-title":"Elasticlave: An efficient memory model for enclaves","volume-title":"Proc. 31st USENIX Security. Symp. (USENIX Security.)","author":"Yu"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/43\/11329484\/11036587.pdf?arnumber=11036587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T18:32:04Z","timestamp":1767810724000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11036587\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":52,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2025.3575014","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"value":"0278-0070","type":"print"},{"value":"1937-4151","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}