{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:44:47Z","timestamp":1761709487940,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,2]],"date-time":"2018-06-02T00:00:00Z","timestamp":1527897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation Singapore","award":["NRF2016NCR-NCR001-006"],"award-info":[{"award-number":["NRF2016NCR-NCR001-006"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,2]]},"DOI":"10.1145\/3214292.3214298","type":"proceedings-article","created":{"date-parts":[[2018,5,25]],"date-time":"2018-05-25T12:39:28Z","timestamp":1527251968000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["SMARTS"],"prefix":"10.1145","author":[{"given":"Ming Ming","family":"Wong","sequence":"first","affiliation":[{"name":"Nanyang Technological University, (NTU) Singapore"}]},{"given":"Jawad","family":"Haj-Yahya","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, (NTU) Singapore"}]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, (NTU) Singapore"}]}],"member":"320","published-online":{"date-parts":[[2018,6,2]]},"reference":[{"volume-title":"IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices","year":"2007","key":"e_1_3_2_1_1_1","unstructured":"2008. IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices . IEEE Std 1619- 2007 (April 2008), c1--32. 2008. IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices. IEEE Std 1619-2007 (April 2008), c1--32."},{"key":"e_1_3_2_1_2_1","volume-title":"Software Guard Extensions Programming Reference. Reference no. 329298-001US","author":"2013. Intel Corporation","year":"2013","unstructured":"2013. Intel Corporation . Software Guard Extensions Programming Reference. Reference no. 329298-001US ( 2013 ). 2013. Intel Corporation. Software Guard Extensions Programming Reference. Reference no. 329298-001US (2013)."},{"key":"e_1_3_2_1_3_1","volume-title":"Software Guard Extensions Programming Reference. Reference no. 329298-002US","author":"2014. Intel Corporation","year":"2014","unstructured":"2014. Intel Corporation . Software Guard Extensions Programming Reference. Reference no. 329298-002US ( 2014 ). 2014. Intel Corporation. Software Guard Extensions Programming Reference. Reference no. 329298-002US (2014)."},{"key":"e_1_3_2_1_4_1","volume-title":"Authenticated Ecryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In Advances in Cryptology --- ASIACRYPT","author":"Bellare Mihir","year":"2000","unstructured":"Mihir Bellare and Chanathip Namprempre . 2000 . Authenticated Ecryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In Advances in Cryptology --- ASIACRYPT 2000, Tatsuaki Okamoto (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg, 531--545. Mihir Bellare and Chanathip Namprempre. 2000. Authenticated Ecryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In Advances in Cryptology --- ASIACRYPT 2000, Tatsuaki Okamoto (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 531--545."},{"volume-title":"Tagged memory and minion cores in the lowRISC SoC. Memo","author":"Bradbury Alex","key":"e_1_3_2_1_5_1","unstructured":"Alex Bradbury , Gavin Ferris , and Robert Mullins . 2014. Tagged memory and minion cores in the lowRISC SoC. Memo , University of Cambridge (2014) . Alex Bradbury, Gavin Ferris, and Robert Mullins. 2014. Tagged memory and minion cores in the lowRISC SoC. Memo, University of Cambridge (2014)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"D. Champagne and R. B. Lee. 2010. Scalable architectural support for trusted software. In HPCA - 16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture. 1--12.  D. Champagne and R. B. Lee. 2010. Scalable architectural support for trusted software. In HPCA - 16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture. 1--12.","DOI":"10.1109\/HPCA.2010.5416657"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995896.1995914"},{"key":"e_1_3_2_1_8_1","first-page":"86","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptology ePrint Archive 2016 (2016), 86 . http:\/\/eprint.iacr.org\/2016\/086 Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 2016 (2016), 86. http:\/\/eprint.iacr.org\/2016\/086","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_9_1","volume-title":"Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium, USENIX Security 16","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia A. Lebedev , and Srinivas Devadas . 2016 . Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium, USENIX Security 16 , Austin, TX, USA, August 10--12 , 2016. 857--874. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/costan Victor Costan, Ilia A. Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10--12, 2016. 857--874. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/costan"},{"key":"e_1_3_2_1_10_1","unstructured":"C. Dobraunig M. Eichlseder F. Mendel and M. Schlaffer. 2016. Ascon v1.2. In Submission to the CAESAR Competition.  C. Dobraunig M. Eichlseder F. Mendel and M. Schlaffer. 2016. Ascon v1.2. In Submission to the CAESAR Competition."},{"volume-title":"Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality","author":"Dworkin Morris J.","key":"e_1_3_2_1_11_1","unstructured":"Morris J. Dworkin . 2004. SP800-38 C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality . Technical Report. Gaithersburg, MD , United States . Morris J. Dworkin. 2004. SP800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. Technical Report. Gaithersburg, MD, United States."},{"volume-title":"Recommendation for Block Cipher Modes of Operation: Galois \/ Counter Mode (GCM) and GMAC","author":"Dworkin Morris J.","key":"e_1_3_2_1_12_1","unstructured":"Morris J. Dworkin . 2007. SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois \/ Counter Mode (GCM) and GMAC . Technical Report. Gaithersburg, MD , United States . Morris J. Dworkin. 2007. SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois \/ Counter Mode (GCM) and GMAC. Technical Report. Gaithersburg, MD, United States."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01004-0_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_20"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382536.2382540"},{"key":"e_1_3_2_1_16_1","unstructured":"Clemens Fruhwirth. 2005. New methods in hard disk encryption. http:\/\/clemens.endorphin.org\/nmihde\/nmihde-A4-ds.pdf.  Clemens Fruhwirth. 2005. New methods in hard disk encryption. http:\/\/clemens.endorphin.org\/nmihde\/nmihde-A4-ds.pdf."},{"key":"e_1_3_2_1_17_1","first-page":"204","article-title":"A Memory Encryption Engine Suitable for General Purpose Processors","volume":"2016","author":"Gueron Shay","year":"2016","unstructured":"Shay Gueron . 2016 . A Memory Encryption Engine Suitable for General Purpose Processors . IACR Cryptology ePrint Archive 2016 (2016), 204 . Shay Gueron. 2016. A Memory Encryption Engine Suitable for General Purpose Processors. IACR Cryptology ePrint Archive 2016 (2016), 204.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_7"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566673"},{"key":"e_1_3_2_1_20_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. arXiv preprint arXiv:1801.01203","author":"Kocher Paul","year":"2018","unstructured":"Paul Kocher , Daniel Genkin , Daniel Gruss , Werner Haas , Mike Hamburg , Moritz Lipp , Stefan Mangard , Thomas Prescher , Michael Schwarz , and Yuval Yarom . 2018 . Spectre Attacks: Exploiting Speculative Execution. arXiv preprint arXiv:1801.01203 (2018). Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2018. Spectre Attacks: Exploiting Speculative Execution. arXiv preprint arXiv:1801.01203 (2018)."},{"key":"e_1_3_2_1_21_1","volume-title":"arXiv preprint arXiv:1801.01207","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018. Meltdown. arXiv preprint arXiv:1801.01207 ( 2018 ). Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown. arXiv preprint arXiv:1801.01207 (2018)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30556-9_27"},{"key":"e_1_3_2_1_23_1","volume-title":"Protocols for Public Key Cryptosystems. In 1980 IEEE Symposium on Security and Privacy. 122--122","author":"Merkle R. C.","year":"1980","unstructured":"R. C. Merkle . 1980 . Protocols for Public Key Cryptosystems. In 1980 IEEE Symposium on Security and Privacy. 122--122 . R. C. Merkle. 1980. Protocols for Public Key Cryptosystems. In 1980 IEEE Symposium on Security and Privacy. 122--122."},{"key":"e_1_3_2_1_24_1","volume-title":"Advances in Cryptology - ASIACRYPT","author":"Rogaway Phillip","year":"2004","unstructured":"Phillip Rogaway . 2004. Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC . In Advances in Cryptology - ASIACRYPT 2004 , Pil Joong Lee (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg, 16--31. Phillip Rogaway. 2004. Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. In Advances in Cryptology - ASIACRYPT 2004, Pil Joong Lee (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 16--31."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.44"},{"key":"e_1_3_2_1_26_1","volume-title":"Exploiting the DRAM Rowhammer bug to gain kernel privileges. Black Hat","author":"Seaborn Mark","year":"2015","unstructured":"Mark Seaborn and Thomas Dullien . 2015. Exploiting the DRAM Rowhammer bug to gain kernel privileges. Black Hat ( 2015 ), 7--9. Mark Seaborn and Thomas Dullien. 2015. Exploiting the DRAM Rowhammer bug to gain kernel privileges. Black Hat (2015), 7--9."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings. 36th Annual IEEE\/ACM International Symposium on Microarchitecture","author":"Suh G. E.","year":"2003","unstructured":"G. E. Suh , D. Clarke , B. Gasend , M. van Dijk , and S. Devadas . 2003. Efficient memory integrity verification and encryption for secure processors . In Proceedings. 36th Annual IEEE\/ACM International Symposium on Microarchitecture , 2003 . MICRO-36. 339--350. G. E. Suh, D. Clarke, B. Gasend, M. van Dijk, and S. Devadas. 2003. Efficient memory integrity verification and encryption for secure processors. In Proceedings. 36th Annual IEEE\/ACM International Symposium on Microarchitecture, 2003. MICRO-36. 339--350."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/378995.379237"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-018-0180-2"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.22"}],"event":{"name":"HASP '18: Hardware and Architectural Support for Security and Privacy","acronym":"HASP '18","location":"Los Angeles California"},"container-title":["Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3214292.3214298","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3214292.3214298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:54:19Z","timestamp":1750287259000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3214292.3214298"}},"subtitle":["secure memory assurance of RISC-V trusted SoC"],"short-title":[],"issued":{"date-parts":[[2018,6,2]]},"references-count":31,"alternative-id":["10.1145\/3214292.3214298","10.1145\/3214292"],"URL":"https:\/\/doi.org\/10.1145\/3214292.3214298","relation":{},"subject":[],"published":{"date-parts":[[2018,6,2]]},"assertion":[{"value":"2018-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}