{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:44:03Z","timestamp":1772045043980,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003130","name":"Fonds Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003130","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484782","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"1357-1372","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves"],"prefix":"10.1145","author":[{"given":"Fritz","family":"Alder","sequence":"first","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Jo","family":"Van Bulck","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Frank","family":"Piessens","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Jan Tobias","family":"M\u00fchlberg","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"TrustZone: Integrated hardware and software security. ARM white paper","author":"Alves Tiago","year":"2004","unstructured":"Tiago Alves and Don Felton. 2004. TrustZone: Integrated hardware and software security. ARM white paper, Vol. 3, 4 (2004), 18--24."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2815038"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970748"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 30th USENIX Security Symposium.","author":"Bahmani Raad","year":"2021","unstructured":"Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2021. CURE: A Security Architecture with CUstomizable and Resilient Enclaves. In Proceedings of the 30th USENIX Security Symposium."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2011.38"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_3_2_1_8_1","volume-title":"Mixed criticality systems -- a review. Department of Computer Science","author":"Burns Alan","year":"2019","unstructured":"Alan Burns and Robert Davis. 2019. Mixed criticality systems -- a review. Department of Computer Science, University of York, Tech. Rep (2019), 1--81."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF49147.2020.00026"},{"key":"e_1_3_2_1_10_1","volume-title":"CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems. In 2019 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 1--8.","author":"Dessouky Ghada","year":"2019","unstructured":"Ghada Dessouky, Shaza Zeitouni, Ahmad Ibrahim, Lucas Davi, and Ahmad-Reza Sadeghi. 2019. CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems. In 2019 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 1--8."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6_25"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2018.00016"},{"key":"e_1_3_2_1_13_1","volume-title":"NDSS","volume":"12","author":"Eldefrawy Karim","year":"2012","unstructured":"Karim Eldefrawy, Gene Tsudik, Aur\u00e9lien Francillon, and Daniele Perito. 2012. SMART: Secure and minimal architecture for (establishing a dynamic) root of trust.. In NDSS, Vol. 12. Internet Society, 1--15."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0141-6"},{"key":"e_1_3_2_1_15_1","unstructured":"Olivier Girard. 2009. openMSP430 -- a synthesizable 16-bit microcontroller core written in Verilog. https:\/\/opencores.org\/project openmsp430."},{"key":"e_1_3_2_1_16_1","volume-title":"Twenty-Fifth Chaos Communications Congress.","author":"Goodspeed Travis","year":"2008","unstructured":"Travis Goodspeed. 2008. Practical attacks against the MSP430 BSL. In Twenty-Fifth Chaos Communications Congress."},{"key":"e_1_3_2_1_17_1","volume-title":"CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels. In 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016","author":"Gu Ronghui","year":"2016","unstructured":"Ronghui Gu, Zhong Shao, Hao Chen, Xiongnan (Newman) Wu, Jieung Kim, Vilhelm Sj\u00f6 berg, and David Costanzo. 2016. CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels. In 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016, Savannah, GA, USA, November 2--4, 2016. USENIX Association, 653--669."},{"key":"e_1_3_2_1_18_1","volume-title":"Intel 64 and IA-32 architectures software developer's manual --","author":"Intel Corporation","unstructured":"Intel Corporation. 2020. Intel 64 and IA-32 architectures software developer's manual -- Volume 3D: System programming guide, part 4. Reference no. 332831-072US."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_3_2_1_21_1","volume-title":"Keystone: Open-source Secure Hardware Enclave. https:\/\/keystone-enclave.org\/.","author":"Lee Dayeol","year":"2018","unstructured":"Dayeol Lee, David Kohlbrenner, Kevin Cheang, Cameron Rasmussen, Kevin Laeufer, Ian Fang, Akash Khosla, Chia-Che Tsai, Sanjit Seshia, Dawn Song, and Krste Asanovic. 2018. Keystone: Open-source Secure Hardware Enclave. https:\/\/keystone-enclave.org\/."},{"key":"e_1_3_2_1_22_1","volume-title":"Electronics","volume":"9","author":"Liu Songran","year":"2020","unstructured":"Songran Liu, Nan Guan, Zhishan Guo, and Wang Yi. 2020. MiniTEE: A Lightweight TrustZone-Assisted TEE for Real-Time Systems. Electronics, Vol. 9, 7 (2020)."},{"key":"e_1_3_2_1_23_1","volume-title":"Workshop on Mixed Criticality Systems. 9--14","author":"Lyons Anna","year":"2014","unstructured":"Anna Lyons and Gernot Heiser. 2014. Mixed-criticality support in a high-assurance, general-purpose microkernel. In Workshop on Mixed Criticality Systems. 9--14."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2647955"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420960"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3356401.3356419"},{"key":"e_1_3_2_1_28_1","volume-title":"22nd USENIX Security Symposium. USENIX Association, 479--494","author":"Noorman Job","year":"2013","unstructured":"Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In 22nd USENIX Security Symposium. USENIX Association, 479--494."},{"key":"e_1_3_2_1_29_1","volume-title":"Jan Tobias M\u00fchlberg, and Frank Piessens","author":"Noorman Job","year":"2017","unstructured":"Job Noorman, Jan Tobias M\u00fchlberg, and Frank Piessens. 2017a. Authentic execution of distributed event-driven applications with a small TCB. In STM '17 (LNCS), Vol. 10547. Springer, Heidelberg, 55--71."},{"key":"e_1_3_2_1_30_1","article-title":"Sancus 2.0: A low-cost security architecture for IoT devices","volume":"20","author":"Noorman J.","year":"2017","unstructured":"J. Noorman, J. Van Bulck, J. Tobias M\u00fchlberg, F. Piessens, P. Maene, B. Preneel, I. Verbauwhede, J. G\u00f6tzfried, T. M\u00fcller, and F. Freiling. 2017b. Sancus 2.0: A low-cost security architecture for IoT devices. ACM Transactions on Privacy and Security (TOPS), Vol. 20, 3 (2017), 7:1--7:33.","journal-title":"ACM Transactions on Privacy and Security (TOPS)"},{"key":"e_1_3_2_1_31_1","volume-title":"VRASED: A Verified Hardware\/Software Co-Design for Remote Attestation. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Oliveira Nunes Ivan De","year":"2019","unstructured":"Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, and Gene Tsudik. 2019. VRASED: A Verified Hardware\/Software Co-Design for Remote Attestation. In 28th USENIX Security Symposium (USENIX Security 19). 1429--1446."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699503"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.17"},{"key":"e_1_3_2_1_34_1","volume-title":"Towards a TrustZone-assisted hypervisor for real-time embedded systems","author":"Pinto Sandro","year":"2016","unstructured":"Sandro Pinto, Jorge Pereira, Tiago Gomes, Mongkol Ekpanyapong, and Adriano Tavares. 2016. Towards a TrustZone-assisted hypervisor for real-time embedded systems. IEEE computer architecture letters, Vol. 16, 2 (2016), 158--161."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407050"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-017-9286-3"},{"key":"e_1_3_2_1_37_1","unstructured":"Wilson Snyder. 2020. Verilator the fastest Verilog\/SystemVerilog simulator. https:\/\/www.veripool.org\/wiki\/verilator."},{"key":"e_1_3_2_1_38_1","volume-title":"Security and Privacy in Communication Networks","author":"Strackx Raoul","unstructured":"Raoul Strackx, Frank Piessens, and Bart Preneel. 2010. Efficient isolation of trusted subsystems in embedded systems. In Security and Privacy in Communication Networks. Springer, 344--361."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS'19)","author":"Bulck Jo Van","year":"2019","unstructured":"Jo Van Bulck, David Oswald, Eduard Marin, Abdulla Aldoseri, Flavio D. Garcia, and Frank Piessens. 2019. A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes. In Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS'19). ACM."},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS'18)","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Frank Piessens, and Raoul Strackx. 2018. Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic. In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS'18). ACM."},{"key":"e_1_3_2_1_41_1","volume-title":"Jan Tobias M\u00fchlberg, and Frank Piessens","author":"Winderix Hans","year":"2021","unstructured":"Hans Winderix, Jan Tobias M\u00fchlberg, and Frank Piessens. 2021. Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks. In EuroS&P '21. IEEE, Washington, DC, USA."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484782","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:52:17Z","timestamp":1763499137000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484782"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":41,"alternative-id":["10.1145\/3460120.3484782","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484782","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}