{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:29:29Z","timestamp":1750746569134,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EU\/H2020","award":["869986"],"award-info":[{"award-number":["869986"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3477314.3508378","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:37:36Z","timestamp":1651883856000},"page":"139-146","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Software-defined hardware-assisted isolation for trusted next-generation IoT systems"],"prefix":"10.1145","author":[{"given":"Filippos-George","family":"Kolimbianakis","sequence":"first","affiliation":[{"name":"Hellenic Mediterranean University, Estavromenos, Iraklio, Crete, Greece"}]},{"given":"George","family":"Kornaros","sequence":"additional","affiliation":[{"name":"Hellenic Mediterranean University, Estavromenos, Iraklio, Crete, Greece"}]}],"member":"320","published-online":{"date-parts":[[2022,5,6]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Proc. of 2nd International Workshop on Hardware and Architectural Support for Security and Privacy.","author":"R.","year":"2013","unstructured":"McKeen, F., Alexandrovich, I., Berenzon, A., Rozas, C.V., Shafi, H., Shanbhogue, V., Savagaonkar, U.R.: Innovative Instructions and Software Model for Isolated Execution. In: Proc. of 2nd International Workshop on Hardware and Architectural Support for Security and Privacy. pp. 10:1--10:1. HASP '13, Jun. 2013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2910140"},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"Vienna","author":"Li X.","year":"2018","unstructured":"X. Li, X. Wang, F. Liu and H. Xu, \"DHL: Enabling Flexible Software Network Functions with FPGA Acceleration,\" 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), Vienna, 2018, pp. 1--11."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 8th Workshop on Secure Network Protocols (NPSec), ICNP","author":"Rowan K.","year":"2013","unstructured":"K. Rowan, V. Kotronis and P. Smith, \"OpenFlow: a security analysis\", In Proceedings of the 8th Workshop on Secure Network Protocols (NPSec), ICNP, Oct. 2013."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23194"},{"key":"e_1_3_2_1_7_1","first-page":"249","volume-title":"Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '16)","author":"Markuze A.","unstructured":"A. Markuze, A. Morrison, and D. Tsafrir, \"True IOMMU Protection from DMA Attacks: When Copy is Faster than Zero Copy\", In Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '16), pp. 249--262."},{"key":"e_1_3_2_1_8_1","first-page":"117","volume-title":"USENIX Annual Technical Conference (ATC)","author":"Boyd-Wickizer S.","year":"2010","unstructured":"S. Boyd-Wickizer and N. Zeldovich, \"Tolerating Malicious Device Drivers in Linux\", In USENIX Annual Technical Conference (ATC), pp. 117--130, 2010."},{"key":"e_1_3_2_1_9_1","volume-title":"pt. 3: Exploiting the Wi-Fi stack on Apple devices","author":"Beniamini G.","year":"2017","unstructured":"G. Beniamini, \"Over the air - vol. 2, pt. 3: Exploiting the Wi-Fi stack on Apple devices,\" Oct. 2017. [Online]. Available: https:\/\/googleprojectzero:blogspot:co:uk\/2017\/10\/over-air-vol-2-pt-3-exploiting-wi-fi:html"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CAHPC.2018.8645945"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2907912"},{"key":"e_1_3_2_1_12_1","first-page":"273","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Lan C.","year":"2016","unstructured":"C. Lan, J. Sherry, R. A. Popa, S. Ratnasamy, and Z. Liu, \"Embark: securely outsourcing middleboxes to the cloud\", In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pages 255{273, 2016."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787502"},{"key":"e_1_3_2_1_14_1","first-page":"14","volume-title":"IEEE\/ACM Symposium on","author":"Bhardwaj K.","year":"2016","unstructured":"K. Bhardwaj, M.-W. Shih, P. Agarwal, A. Gavrilovska, T. Kim, and K. Schwan, \"Fast, scalable and secure onloading of edge functions using airbox\". In Edge Computing (SEC), IEEE\/ACM Symposium on, pages 14--27. IEEE, 2016."},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Workshop Hot Topics Edge Comput. (HotEdge 18)","author":"Bhardwaj K.","year":"2018","unstructured":"K. Bhardwaj, J. C. Miranda, and A. Gavrilovska, \"Towards IoT-DDoS prevention using edge computing,\" in Proc. USENIX Workshop Hot Topics Edge Comput. (HotEdge 18), 2018."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2019.2915983"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI'17)","author":"Go Y.","year":"2017","unstructured":"Y. Go, M. A. Jamshed, Y.G. Moon, C. Hwang, and K.S. Park, \"APUNet: Revitalizing GPU as Packet Processing Accelerator\", In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI'17), 2017."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934897"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185469"},{"volume-title":"48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks","year":"2018","key":"e_1_3_2_1_20_1","unstructured":"Goltzsche et al., \"ENDBOX: Scalable Middlebox Functions Using Client-Side Trusted Execution\", in 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, 2018."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665798"},{"key":"e_1_3_2_1_23_1","volume-title":"Securing real-time microcontroller systems through customized memory view switching,\" in Network and Distributed Systems Security Symp. (NDSS)","author":"Kim C. H.","year":"2018","unstructured":"C. H. Kim, T. Kim, H. Choi, Z. Gu, B. Lee, X. Zhang, and D. Xu, \"Securing real-time microcontroller systems through customized memory view switching,\" in Network and Distributed Systems Security Symp. (NDSS), 2018."},{"key":"e_1_3_2_1_24_1","unstructured":"The mbed OS uVisor. https:\/\/www.mbed.com\/en\/technologies\/security\/uvisor\/"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9214576"},{"key":"e_1_3_2_1_26_1","first-page":"1","volume-title":"Jun. 2017","author":"Ziegler S.","unstructured":"S. Ziegler, A. Skarmeta, J. Bernal, E. Kim, and S. Bianchi, \"Anastacia: Advanced networked agents for security and trust assessment in CPS IoT architectures,\" in 2017 Global Internet of Things Summit (GIoTS), Jun. 2017, pp. 1--6."},{"key":"e_1_3_2_1_27_1","volume-title":"Towards Provisioning of SDN\/NFV-based Security Enablers for Integrated Protection of IoT Systems,\" in IEEE Conference on Standards for Communications and Networking (CSCN-2017)","author":"Farris I.","year":"2017","unstructured":"I. Farris, J. Bernabe, N. Toumi, D. Garcia-Carrillo, T. Taleb, A. Skarmeta, and B. Sahlin., \"Towards Provisioning of SDN\/NFV-based Security Enablers for Integrated Protection of IoT Systems,\" in IEEE Conference on Standards for Communications and Networking (CSCN-2017), 2017."},{"key":"e_1_3_2_1_28_1","first-page":"857","volume-title":"Proc of 25th USENIX Security Symposium","author":"Costan V.","year":"2016","unstructured":"V. Costan, I. Lebedev, S. Devadas, \"Sanctum: Minimal Hardware Extensions for Strong Software Isolation\", in Proc of 25th USENIX Security Symposium, pp 857--874, 2016."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2647955"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008250"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2943690"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2952136"},{"key":"e_1_3_2_1_33_1","volume-title":"HTS: A Hardware Task Scheduler for Heterogeneous Systems\", online: https:\/\/arxiv.org\/abs\/1907.00271","author":"Hegde K.","year":"2019","unstructured":"K. Hegde, A. Srivastava, and R. Agrawal, \"HTS: A Hardware Task Scheduler for Heterogeneous Systems\", online: https:\/\/arxiv.org\/abs\/1907.00271, 2019."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2016.59"},{"key":"e_1_3_2_1_35_1","volume-title":"Jul","author":"SDN","year":"2016","unstructured":"Open Networking Foundation, \"Threat Analysis for the SDN Architecture\", ver 1.0, Jul 2016, TR-530, online: https:\/\/opennetworking.org\/wp-content\/uploads\/2014\/10\/Threat_Analysis_for_the_SDN_Architecture.pdf."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323070"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378532"},{"key":"e_1_3_2_1_38_1","first-page":"105","article-title":"Decoupling dynamic information flow tracking with a dedicated coprocessor","author":"Kannan H.","year":"2009","unstructured":"H. Kannan, M. Dalton, and C. Kozyrakis, \"Decoupling dynamic information flow tracking with a dedicated coprocessor,\" in Proceedings of DSN, Jun. 2009, pp. 105--114.","journal-title":"Proceedings of DSN"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2857321"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358327"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSOC.2014.6972448"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2012.55"},{"key":"e_1_3_2_1_43_1","first-page":"105","volume-title":"Minimal kernel: An operating system architecture for TEE to resist board level physical attacks,\" in 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Zhao S.","year":"2019","unstructured":"S. Zhao, Q. Zhang, Y. Qin, W. Feng, and D. Feng, \"Minimal kernel: An operating system architecture for TEE to resist board level physical attacks,\" in 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). Chaoyang District, Beijing: USENIX Association, Sep. 2019, pp. 105--120."}],"event":{"name":"SAC '22: The 37th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Virtual Event","acronym":"SAC '22"},"container-title":["Proceedings of the 37th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3508378","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477314.3508378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:30Z","timestamp":1750188630000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3508378"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":43,"alternative-id":["10.1145\/3477314.3508378","10.1145\/3477314"],"URL":"https:\/\/doi.org\/10.1145\/3477314.3508378","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-05-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}