{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:34Z","timestamp":1763507734751,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3356401.3356419","type":"proceedings-article","created":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T18:56:15Z","timestamp":1572980175000},"page":"50-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Optimized trusted execution for hard real-time applications on COTS processors"],"prefix":"10.1145","author":[{"given":"Anway","family":"Mukherjee","sequence":"first","affiliation":[{"name":"Virginia Tech"}]},{"given":"Tanmaya","family":"Mishra","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Thidapat","family":"Chantem","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Nathan","family":"Fisher","sequence":"additional","affiliation":[{"name":"Wayne State University"}]},{"given":"Ryan","family":"Gerdes","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"57","volume-title":"Trusted execution environment: what it is, and what it is not,\" in Trustcom\/BigDataSE\/ISPA","author":"Sabt M.","year":"2015","unstructured":"M. Sabt , M. Achemlal , and A. Bouabdallah , \" Trusted execution environment: what it is, and what it is not,\" in Trustcom\/BigDataSE\/ISPA , 2015 IEEE, vol. 1 , pp. 57 -- 64 , IEEE , 2015. M. Sabt, M. Achemlal, and A. Bouabdallah, \"Trusted execution environment: what it is, and what it is not,\" in Trustcom\/BigDataSE\/ISPA, 2015 IEEE, vol. 1, pp. 57--64, IEEE, 2015."},{"key":"e_1_3_2_1_2_1","volume-title":"Arm trustzone as a virtualization technique in embedded systems,\" in Proceedings of Twelfth Real-Time Linux Workshop","author":"Frenzel T.","year":"2010","unstructured":"T. Frenzel , A. Lackorzynski , A. Warg , and H. H\u00e4rtig , \" Arm trustzone as a virtualization technique in embedded systems,\" in Proceedings of Twelfth Real-Time Linux Workshop , Nairobi, Kenya , 2010 . T. Frenzel, A. Lackorzynski, A. Warg, and H. H\u00e4rtig, \"Arm trustzone as a virtualization technique in embedded systems,\" in Proceedings of Twelfth Real-Time Linux Workshop, Nairobi, Kenya, 2010."},{"key":"e_1_3_2_1_3_1","unstructured":"S.\n      Pinto J.\n      Pereira T.\n      Gomes A.\n      Tavares and \n      J.\n      Cabral \"\n  LTZVisor: TrustZone is the Key \" in 29th Euromicro Conference on Real-Time Systems (ECRTS 2017)\n   (M. Bertogna ed.) vol. \n  76\n   of \n  Leibniz International Proceedings in Informatics (LIPIcs) (Dagstuhl Germany\n  ) pp. 4:\n  1\n  --\n  4\n  :22 Schloss Dagstuhl-Leibniz-Zentrum fuer \n  Informatik 2017\n  .  S. Pinto J. Pereira T. Gomes A. Tavares and J. Cabral \"LTZVisor: TrustZone is the Key \" in 29th Euromicro Conference on Real-Time Systems (ECRTS 2017) (M. Bertogna ed.) vol. 76 of Leibniz International Proceedings in Informatics (LIPIcs) (Dagstuhl Germany) pp. 4:1--4:22 Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik 2017."},{"key":"e_1_3_2_1_4_1","volume-title":"Encrypted file system using tcpa","author":"Challener D. C.","year":"2008","unstructured":"D. C. Challener and D. R. Safford , \" Encrypted file system using tcpa ,\" Mar. 11 2008 . US Patent 7,343,493. D. C. Challener and D. R. Safford, \"Encrypted file system using tcpa,\" Mar. 11 2008. US Patent 7,343,493."},{"key":"e_1_3_2_1_5_1","first-page":"93","volume-title":"2010 International Conference on","author":"Darwish S. M.","year":"2010","unstructured":"S. M. Darwish , S. K. Guirguis , and M. S. Zalat , \" Stealthy code obfuscation technique for software security,\" in Computer Engineering and Systems (ICCES) , 2010 International Conference on , pp. 93 -- 99 , IEEE, 2010 . S. M. Darwish, S. K. Guirguis, and M. S. Zalat, \"Stealthy code obfuscation technique for software security,\" in Computer Engineering and Systems (ICCES), 2010 International Conference on, pp. 93--99, IEEE, 2010."},{"key":"e_1_3_2_1_6_1","first-page":"175","volume-title":"Rt-trust: automated refactoring for trusted execution under real-time constraints,\" in Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences","author":"Liu Y.","year":"2018","unstructured":"Y. Liu , K. An , and E. Tilevich , \" Rt-trust: automated refactoring for trusted execution under real-time constraints,\" in Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences , pp. 175 -- 187 , ACM , 2018 . Y. Liu, K. An, and E. Tilevich, \"Rt-trust: automated refactoring for trusted execution under real-time constraints,\" in Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, pp. 175--187, ACM, 2018."},{"key":"e_1_3_2_1_7_1","first-page":"445","volume-title":"Trustzone explained: Architectural features and use cases,\" in 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","author":"Ngabonziza B.","year":"2016","unstructured":"B. Ngabonziza , D. Martin , A. Bailey , H. Cho , and S. Martin , \" Trustzone explained: Architectural features and use cases,\" in 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC) , pp. 445 -- 451 , IEEE , 2016 . B. Ngabonziza, D. Martin, A. Bailey, H. Cho, and S. Martin, \"Trustzone explained: Architectural features and use cases,\" in 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), pp. 445--451, IEEE, 2016."},{"key":"e_1_3_2_1_8_1","first-page":"102","volume-title":"Secure edge computing with arm trustzone.,\" in IoTBDS","author":"Pettersen R.","year":"2017","unstructured":"R. Pettersen , H. D. Johansen , and D. Johansen , \" Secure edge computing with arm trustzone.,\" in IoTBDS , pp. 102 -- 109 , 2017 . R. Pettersen, H. D. Johansen, and D. Johansen, \"Secure edge computing with arm trustzone.,\" in IoTBDS, pp. 102--109, 2017."},{"key":"e_1_3_2_1_9_1","volume-title":"ACM","author":"Guan L.","year":"2017","unstructured":"L. Guan , P. Liu , X. Xing , X. Ge , S. Zhang , M. Yu , and T. Jaeger , \" Trustshadow: Secure execution of unmodified applications with arm trustzone,\" in Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, pp. 488--501 , ACM , 2017 . L. Guan, P. Liu, X. Xing, X. Ge, S. Zhang, M. Yu, and T. Jaeger, \"Trustshadow: Secure execution of unmodified applications with arm trustzone,\" in Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, pp. 488--501, ACM, 2017."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210338"},{"key":"e_1_3_2_1_11_1","volume-title":"vtz: Virtualizing arm trustzone,\" in In Proc. of the 26th USENIX Security Symposium","author":"Hua Z.","year":"2017","unstructured":"Z. Hua , J. Gu , Y. Xia , H. Chen , B. Zang , and H. Guan , \" vtz: Virtualizing arm trustzone,\" in In Proc. of the 26th USENIX Security Symposium , 2017 . Z. Hua, J. Gu, Y. Xia, H. Chen, B. Zang, and H. Guan, \"vtz: Virtualizing arm trustzone,\" in In Proc. of the 26th USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_12_1","unstructured":"ARM \"Security technology building a secure system using trustzone technology (white paper) \" ARM Limited 2009.  ARM \"Security technology building a secure system using trustzone technology (white paper) \" ARM Limited 2009."},{"key":"e_1_3_2_1_13_1","unstructured":"\"OP-TEE (Open Portable Trusted Execution Environment).\" https:\/\/www.op-tee.org\/. Accessed: 2018-05-27.  \"OP-TEE (Open Portable Trusted Execution Environment).\" https:\/\/www.op-tee.org\/. Accessed: 2018-05-27."},{"key":"e_1_3_2_1_14_1","unstructured":"\"GlobalPlatform Device Technology TEE Client API Specification.\" https:\/\/www.globalplatform.org\/mediaguidetee.asp. Accessed: 2017-10-05.  \"GlobalPlatform Device Technology TEE Client API Specification.\" https:\/\/www.globalplatform.org\/mediaguidetee.asp. Accessed: 2017-10-05."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/321738.321743"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1665-6423(13)71551-7"},{"key":"e_1_3_2_1_17_1","first-page":"149","volume-title":"An efficient method for assigning harmonic periods to hard real-time tasks with period ranges,\" in 2015 27th Euromicro Conference on Real-Time Systems","author":"Nasri M.","year":"2015","unstructured":"M. Nasri and G. Fohler , \" An efficient method for assigning harmonic periods to hard real-time tasks with period ranges,\" in 2015 27th Euromicro Conference on Real-Time Systems , pp. 149 -- 159 , IEEE , 2015 . M. Nasri and G. Fohler, \"An efficient method for assigning harmonic periods to hard real-time tasks with period ranges,\" in 2015 27th Euromicro Conference on Real-Time Systems, pp. 149--159, IEEE, 2015."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1117"},{"key":"e_1_3_2_1_19_1","first-page":"549","volume-title":"Armageddon: Cache attacks on mobile devices,\" in 25th {USENIX} Security Symposium ({USENIX} Security 16)","author":"Lipp M.","year":"2016","unstructured":"M. Lipp , D. Gruss , R. Spreitzer , C. Maurice , and S. Mangard , \" Armageddon: Cache attacks on mobile devices,\" in 25th {USENIX} Security Symposium ({USENIX} Security 16) , pp. 549 -- 564 , 2016 . M. Lipp, D. Gruss, R. Spreitzer, C. Maurice, and S. Mangard, \"Armageddon: Cache attacks on mobile devices,\" in 25th {USENIX} Security Symposium ({USENIX} Security 16), pp. 549--564, 2016."},{"key":"e_1_3_2_1_20_1","volume-title":"Cache side channel attack: Exploitability and counter-measures,\" Black Hat Asia","author":"Irazoqui G.","year":"2017","unstructured":"G. Irazoqui and X. Guo , \" Cache side channel attack: Exploitability and counter-measures,\" Black Hat Asia , vol. 2017 , 2017 . G. Irazoqui and X. Guo, \"Cache side channel attack: Exploitability and counter-measures,\" Black Hat Asia, vol. 2017, 2017."},{"issue":"5","key":"e_1_3_2_1_21_1","first-page":"188","article-title":"Security-aware scheduling of embedded control tasks","volume":"16","author":"Lesi V.","year":"2017","unstructured":"V. Lesi , I. Jovanov , and M. Pajic , \" Security-aware scheduling of embedded control tasks ,\" ACM Transactions on Embedded Computing Systems (TECS) , vol. 16 , no. 5 s, p. 188 , 2017 . V. Lesi, I. Jovanov, and M. Pajic, \"Security-aware scheduling of embedded control tasks,\" ACM Transactions on Embedded Computing Systems (TECS), vol. 16, no. 5s, p. 188, 2017.","journal-title":"ACM Transactions on Embedded Computing Systems (TECS)"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02341919"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.26.1.127"},{"key":"e_1_3_2_1_24_1","first-page":"10","volume-title":"Proceedings.","author":"Li H.","year":"2003","unstructured":"H. Li , J. Sweeney , K. Ramamritham , R. Grupen , and P. Shenoy , \" Real-time support for mobile robotics,\" in The 9th IEEE Real-Time and Embedded Technology and Applications Symposium, 2003 . Proceedings. , pp. 10 -- 18 , IEEE, 2003 . H. Li, J. Sweeney, K. Ramamritham, R. Grupen, and P. Shenoy, \"Real-time support for mobile robotics,\" in The 9th IEEE Real-Time and Embedded Technology and Applications Symposium, 2003. Proceedings., pp. 10--18, IEEE, 2003."},{"key":"e_1_3_2_1_25_1","unstructured":"J. V. Busquets-Mataix J. J. Serrano R. Ors P. Gil and A. Wellings \"Using harmonic task-sets to increase the schedulable utilization of cache-based preemptive real-time systems \" in Proceedings of 3rd International Workshop on Real-Time Computing Systems and Applications pp. 195--202 IEEE 1996.  J. V. Busquets-Mataix J. J. Serrano R. Ors P. Gil and A. Wellings \"Using harmonic task-sets to increase the schedulable utilization of cache-based preemptive real-time systems \" in Proceedings of 3rd International Workshop on Real-Time Computing Systems and Applications pp. 195--202 IEEE 1996."},{"key":"e_1_3_2_1_26_1","first-page":"3566","volume-title":"Design and implementation of reconfigurable modular humanoid robot architecture,\" in 2005 IEEE\/RSJ International Conference on Intelligent Robots and Systems","author":"Taira T.","year":"2005","unstructured":"T. Taira , N. Kamata , and N. Yamasaki , \" Design and implementation of reconfigurable modular humanoid robot architecture,\" in 2005 IEEE\/RSJ International Conference on Intelligent Robots and Systems , pp. 3566 -- 3571 , IEEE , 2005 . T. Taira, N. Kamata, and N. Yamasaki, \"Design and implementation of reconfigurable modular humanoid robot architecture,\" in 2005 IEEE\/RSJ International Conference on Intelligent Robots and Systems, pp. 3566--3571, IEEE, 2005."},{"key":"e_1_3_2_1_27_1","first-page":"111","volume-title":"Feedback thermal control for real-time systems,\" in 2010 16th IEEE Real-Time and Embedded Technology and Applications Symposium","author":"Fu Y.","year":"2010","unstructured":"Y. Fu , N. Kottenstette , Y. Chen , C. Lu , X. D. Koutsoukos , and H. Wang , \" Feedback thermal control for real-time systems,\" in 2010 16th IEEE Real-Time and Embedded Technology and Applications Symposium , pp. 111 -- 120 , IEEE , 2010 . Y. Fu, N. Kottenstette, Y. Chen, C. Lu, X. D. Koutsoukos, and H. Wang, \"Feedback thermal control for real-time systems,\" in 2010 16th IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 111--120, IEEE, 2010."},{"key":"e_1_3_2_1_28_1","volume-title":"IEEE","author":"Han C.-C.","year":"1997","unstructured":"C.-C. Han and H.-Y. Tyan , \"A better polynomial-time schedulability test for real-time fixed-priority scheduling algorithms,\" in Proceedings Real-Time Systems Symposium, pp. 36--45 , IEEE , 1997 . C.-C. Han and H.-Y. Tyan, \"A better polynomial-time schedulability test for real-time fixed-priority scheduling algorithms,\" in Proceedings Real-Time Systems Symposium, pp. 36--45, IEEE, 1997."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2979677"},{"key":"e_1_3_2_1_30_1","volume-title":"Inception: System-wide security testing of real-world embedded systems software,\" in 27th USENIX Security Symposium (USENIX Security 18)","author":"Corteggiani N.","year":"2018","unstructured":"N. Corteggiani , G. Camurati , and A. Francillon , \" Inception: System-wide security testing of real-world embedded systems software,\" in 27th USENIX Security Symposium (USENIX Security 18) , USENIX Association , 2018 . N. Corteggiani, G. Camurati, and A. Francillon, \"Inception: System-wide security testing of real-world embedded systems software,\" in 27th USENIX Security Symposium (USENIX Security 18), USENIX Association, 2018."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA.2012.56"},{"key":"e_1_3_2_1_32_1","first-page":"109","volume-title":"Int. Conf. Real-Time Networks and Systems","author":"Jiang K.","year":"2013","unstructured":"K. Jiang , A. Lifa , P. Eles , Z. Peng , and W. Jiang , \" Energy-aware design of secure multi-mode real-time embedded systems with FPGA co-processors,\" in Proc . Int. Conf. Real-Time Networks and Systems , pp. 109 -- 118 , Oct. 2013 . K. Jiang, A. Lifa, P. Eles, Z. Peng, and W. Jiang, \"Energy-aware design of secure multi-mode real-time embedded systems with FPGA co-processors,\" in Proc. Int. Conf. Real-Time Networks and Systems, pp. 109--118, Oct. 2013."},{"key":"e_1_3_2_1_33_1","first-page":"123","volume-title":"2016 IEEE","author":"Hasan M.","year":"2016","unstructured":"M. Hasan , S. Mohan , R. B. Bobba , and R. Pellizzoni , \" Exploring opportunistic execution for integrating security into legacy hard real-time systems,\" in Real-Time Systems Symposium (RTSS) , 2016 IEEE , pp. 123 -- 134 , IEEE, 2016 . M. Hasan, S. Mohan, R. B. Bobba, and R. Pellizzoni, \"Exploring opportunistic execution for integrating security into legacy hard real-time systems,\" in Real-Time Systems Symposium (RTSS), 2016 IEEE, pp. 123--134, IEEE, 2016."},{"key":"e_1_3_2_1_34_1","first-page":"1","volume-title":"2015 IEEE 20th Conference on","author":"Pinto S.","year":"2015","unstructured":"S. Pinto , D. Oliveira , J. Pereira , J. Cabral , and A. Tavares , \" Freetee: When real-time and security meet,\" in Emerging Technologies & Factory Automation (ETFA) , 2015 IEEE 20th Conference on , pp. 1 -- 4 , IEEE, 2015 . S. Pinto, D. Oliveira, J. Pereira, J. Cabral, and A. Tavares, \"Freetee: When real-time and security meet,\" in Emerging Technologies & Factory Automation (ETFA), 2015 IEEE 20th Conference on, pp. 1--4, IEEE, 2015."},{"key":"e_1_3_2_1_35_1","volume-title":"ACM","author":"Liu R.","year":"2017","unstructured":"R. Liu and M. Srivastava , \" Protc: Protecting drone's peripherals through arm trustzone,\" in Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications, pp. 1--6 , ACM , 2017 . R. Liu and M. Srivastava, \"Protc: Protecting drone's peripherals through arm trustzone,\" in Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications, pp. 1--6, ACM, 2017."}],"event":{"name":"RTNS 2019: 27th International Conference on Real-Time Networks and Systems","acronym":"RTNS 2019","location":"Toulouse France"},"container-title":["Proceedings of the 27th International Conference on Real-Time Networks and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3356401.3356419","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3356401.3356419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:52Z","timestamp":1750203892000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3356401.3356419"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":35,"alternative-id":["10.1145\/3356401.3356419","10.1145\/3356401"],"URL":"https:\/\/doi.org\/10.1145\/3356401.3356419","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}