{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:34:39Z","timestamp":1740141279644,"version":"3.37.3"},"reference-count":85,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tdsc.2023.3334277","type":"journal-article","created":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T19:36:23Z","timestamp":1701200183000},"page":"1-16","source":"Crossref","is-referenced-by-count":0,"title":["Building a Lightweight Trusted Execution Environment for Arm GPUs"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7039-033X","authenticated-orcid":false,"given":"Chenxu","family":"Wang","sequence":"first","affiliation":[{"name":"Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, China"}]},{"given":"Yunjie","family":"Deng","sequence":"additional","affiliation":[{"name":"Research Institute of Trustworthy Autonomous Systems, and Department of Computer Science and Engineering, Southern University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7763-1079","authenticated-orcid":false,"given":"Zhenyu","family":"Ning","sequence":"additional","affiliation":[{"name":"Hunan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4001-3442","authenticated-orcid":false,"given":"Kevin","family":"Leach","sequence":"additional","affiliation":[{"name":"Institute for Software Integrated Systems, Vanderbilt University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0385-8793","authenticated-orcid":false,"given":"Jin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Guangzhou University, China"}]},{"given":"Shoumeng","family":"Yan","sequence":"additional","affiliation":[{"name":"Ant Group, China"}]},{"given":"Zhengyu","family":"He","sequence":"additional","affiliation":[{"name":"Ant Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2725-2529","authenticated-orcid":false,"given":"Jiannong","family":"Cao","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3365-2526","authenticated-orcid":false,"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, and Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, China"}]}],"member":"263","reference":[{"year":"2022","key":"ref1","article-title":"Game engine guides"},{"year":"2022","key":"ref2","article-title":"Mali texture compression tool"},{"year":"2022","key":"ref3","article-title":"VR best practice"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2973801"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3089801.3089804"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303949"},{"key":"ref7","article-title":"NVIDIA DATA CENTER GPUs"},{"key":"ref8","article-title":"GPUs on compute engine"},{"key":"ref9","article-title":"Discover metal enhancements for A14 bionic"},{"key":"ref10","article-title":"Adreno graphics processing units"},{"issue":"1","key":"ref11","first-page":"62","article-title":"BlazeFace:Sub-millisecond neural face detection on mobile GPUs","volume":"9","author":"Bazarevsky","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"author":"IoT","key":"ref12","article-title":"ASUS IoT face recognition edge AI dev kit"},{"key":"ref13","article-title":"Artificial intelligence (AI) face recognition function pack for STM32Cube"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00098"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2881425"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref17","first-page":"817","article-title":"Telekine: Secure computing with cloud GPUs","volume-title":"Proc. 17th USENIX Symp. Networked Syst. Des. Implementation","author":"Hunt","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"year":"2009","key":"ref20","article-title":"ARM security technology building a secure system using TrustZone technology"},{"issue":"86","key":"ref21","first-page":"1","article-title":"Intel SGX explained","volume":"2016","author":"Costan","year":"2016"},{"key":"ref22","article-title":"AMD secure encrypted virtualization"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304021"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5555\/3291168.3291219"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00054"},{"key":"ref26","article-title":"CVE-2022-21815"},{"key":"ref27","article-title":"CVE-2021-1121"},{"key":"ref28","article-title":"CVE-2021-1093"},{"key":"ref29","article-title":"CVE-2022-21821"},{"key":"ref30","article-title":"CVE-2020-5991"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3450268.3453524"},{"key":"ref32","article-title":"NVIDIA confidential computing"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2009.5306797"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2988251"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2015.17"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2018.00029"},{"key":"ref37","article-title":"OP-TEE Test"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560627"},{"key":"ref39","article-title":"Fixed virtual platforms"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483554"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00019"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3322469"},{"key":"ref43","first-page":"177","article-title":"PAC it up: Towards pointer integrity using ARM pointer authentication","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Liljestrand","year":"2019"},{"year":"2022","key":"ref44","article-title":"Trustzone for cortex-A"},{"year":"2013","key":"ref45","article-title":"ARM generic interrupt controller architecture specification version 2.0"},{"year":"2023","key":"ref46","article-title":"GICv3 and GICv4 software overview"},{"year":"2022","key":"ref47","article-title":"Cortex-A7 MPCore technical reference manual"},{"year":"2022","key":"ref48","article-title":"Arm Cortex-A53 MPCore processor technical reference manual"},{"year":"2022","key":"ref49","article-title":"Arm Cortex-A57 MPCore processor technical reference manual"},{"year":"2022","key":"ref50","article-title":"Arm Cortex-A72 MPCore processor technical reference manual"},{"year":"2023","key":"ref51","article-title":"Mali GPU user-space binary drivers"},{"year":"2022","key":"ref52","article-title":"Arm architecture reference manual Armv8, for Armv8-A architecture profile"},{"key":"ref53","first-page":"2261","article-title":"REZONE: Disarming TrustZone with TEE privilege reduction","author":"Cerdeira","year":"2022"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3469116.3470014"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538948"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref60","article-title":"CVE-2021-44149"},{"key":"ref61","article-title":"Juno r2 ARM development platform SoC"},{"key":"ref62","article-title":"Open source Mali midgard GPU kernel drivers"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23189"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813692"},{"author":"Eklektix","key":"ref65","article-title":"A deep dive into CMA"},{"key":"ref66","article-title":"Midgard architecture"},{"key":"ref67","article-title":"Mali-G78 GPUs valhall instruction set documentation released after reverse-engineering work"},{"key":"ref68","article-title":"cloc"},{"key":"ref70","first-page":"427","article-title":"A framework for software diversification with ISA heterogeneity","volume-title":"Proc. 23rd Int. Symp. Res. Attacks","author":"Wang","year":"2020"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3555776.3577635"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23448"},{"key":"ref73","first-page":"541","article-title":"vTZ: Virtualizing ARM TrustZone","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Hua","year":"2017"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2490301.2451145"},{"year":"2017","key":"ref75","article-title":"Rockchip RK3288 technical reference manual Part1"},{"author":"Amlogic","key":"ref76","article-title":"S905 datasheet"},{"key":"ref77","article-title":"GPU device tree configuration"},{"key":"ref78","article-title":"Arm-trusted-Firmware"},{"key":"ref79","article-title":"Granule protection tables in TF-A"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.09.005"},{"author":"Mesa","key":"ref81","article-title":"The mesa 3D graphics library"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3524059.3532361"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.11"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451146"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081349"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2622261"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2910861"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3313808.3313810"},{"year":"2023","key":"ref89","article-title":"Hafnium"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/4358699\/10330747.pdf?arnumber=10330747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T04:48:34Z","timestamp":1721191714000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10330747\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":85,"URL":"https:\/\/doi.org\/10.1109\/tdsc.2023.3334277","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2024]]}}}