{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T01:03:55Z","timestamp":1773277435464,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":94,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020AAA0108500"],"award-info":[{"award-number":["2020AAA0108500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China National Natural Science Foundation","award":["62302300"],"award-info":[{"award-number":["62302300"]}]},{"name":"China National Natural Science Foundation","award":["61925206"],"award-info":[{"award-number":["61925206"]}]},{"name":"China National Natural Science Foundation","award":["U19A2060"],"award-info":[{"award-number":["U19A2060"]}]},{"name":"Startup Fund for Young Faculty at SJTU"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3620665.3640378","type":"proceedings-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T14:18:06Z","timestamp":1713795486000},"page":"1061-1076","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["sIOPMP: Scalable and Efficient I\/O Protection for TEEs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-5957-3024","authenticated-orcid":false,"given":"Erhu","family":"Feng","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1146-8552","authenticated-orcid":false,"given":"Dahu","family":"Feng","sequence":"additional","affiliation":[{"name":"Tsinghua university, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7945-8430","authenticated-orcid":false,"given":"Dong","family":"Du","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6558-5298","authenticated-orcid":false,"given":"Yubin","family":"Xia","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4775-7165","authenticated-orcid":false,"given":"Wenbin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Alibaba DAMO Academy, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5177-2821","authenticated-orcid":false,"given":"Siqi","family":"Zhao","sequence":"additional","affiliation":[{"name":"Alibaba DAMO Academy, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9720-0361","authenticated-orcid":false,"given":"Haibo","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"d.]. Arm Confidential Compute Architecture. https:\/\/www.arm.com\/architecture\/security-features\/arm-confidential-compute-architecture. Referenced","year":"2022","unstructured":"[n. d.]. Arm Confidential Compute Architecture. https:\/\/www.arm.com\/architecture\/security-features\/arm-confidential-compute-architecture. Referenced April 2022."},{"key":"e_1_3_2_1_2_1","volume-title":"d.]. Compute Express Link. https:\/\/en.wikipedia.org\/wiki\/Compute_Express_Link. Referenced","year":"2022","unstructured":"[n. d.]. Compute Express Link. https:\/\/en.wikipedia.org\/wiki\/Compute_Express_Link. Referenced April 2022."},{"key":"e_1_3_2_1_3_1","volume-title":"d.]. Compute Express Link. https:\/\/www.computeexpresslink.org\/. Referenced","year":"2021","unstructured":"[n. d.]. Compute Express Link. https:\/\/www.computeexpresslink.org\/. Referenced Aug. 2021."},{"key":"e_1_3_2_1_4_1","volume-title":"d.]. input\/output physical memory protection. https:\/\/github.com\/riscv-admin\/iopmp. Referenced","year":"2023","unstructured":"[n. d.]. input\/output physical memory protection. https:\/\/github.com\/riscv-admin\/iopmp. Referenced April 2023."},{"key":"e_1_3_2_1_5_1","volume-title":"d.]. Intel Trust Domain Extensions. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-trust-domain-extensions.html. Referenced","year":"2022","unstructured":"[n. d.]. Intel Trust Domain Extensions. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-trust-domain-extensions.html. Referenced April 2022."},{"key":"e_1_3_2_1_6_1","unstructured":"2019. AMD Secure Encrypted Virtualization (SEV) - AMD. https:\/\/developer.amd.com\/sev\/."},{"key":"e_1_3_2_1_7_1","volume-title":"Mellanox Innova-2 Flex Open Programmable SmartNIC. https:\/\/www.mellanox.com\/products\/smartnics\/innova-2-flex. Referenced","year":"2021","unstructured":"2021. Mellanox Innova-2 Flex Open Programmable SmartNIC. https:\/\/www.mellanox.com\/products\/smartnics\/innova-2-flex. Referenced 2021."},{"key":"e_1_3_2_1_8_1","volume-title":"Multi-Core Processors - LiquidIO Smart NICs | Network adapter - Marvell. https:\/\/www.marvell.com\/products\/infrastructure-processors\/multi-core-processors\/liquidio-smart-nics.html. Referenced","year":"2021","unstructured":"2021. Multi-Core Processors - LiquidIO Smart NICs | Network adapter - Marvell. https:\/\/www.marvell.com\/products\/infrastructure-processors\/multi-core-processors\/liquidio-smart-nics.html. Referenced 2021."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/netfpga.org. Referenced","author":"FPGA.","year":"2021","unstructured":"2021. NetFPGA. https:\/\/netfpga.org. Referenced 2021."},{"key":"e_1_3_2_1_10_1","volume-title":"NVIDIA Mellanox BlueField DPU. https:\/\/www.mellanox.com\/products\/bluefield-overview. Referenced","year":"2021","unstructured":"2021. NVIDIA Mellanox BlueField DPU. https:\/\/www.mellanox.com\/products\/bluefield-overview. Referenced 2021."},{"key":"e_1_3_2_1_11_1","volume-title":"Stingray SmartNIC Adapters and IC. https:\/\/www.broadcom.com\/products\/ethernet-connectivity\/network-adapters\/smartnic. Referenced","year":"2021","unstructured":"2021. Stingray SmartNIC Adapters and IC. https:\/\/www.broadcom.com\/products\/ethernet-connectivity\/network-adapters\/smartnic. Referenced 2021."},{"key":"e_1_3_2_1_12_1","volume-title":"Trustzone: Integrated hardware and software security. White paper","author":"Alves Tiago","year":"2004","unstructured":"Tiago Alves. 2004. Trustzone: Integrated hardware and software security. White paper (2004)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2020.2996616"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2020007"},{"key":"e_1_3_2_1_15_1","volume-title":"AMD SEV-TIO: Trusted I\/O for Secure Encrypted Virtualization. https:\/\/www.amd.com\/system\/files\/documents\/sev-tio-whitepaper.pdf. Referenced","year":"2023","unstructured":"Arm. 2023. AMD SEV-TIO: Trusted I\/O for Secure Encrypted Virtualization. https:\/\/www.amd.com\/system\/files\/documents\/sev-tio-whitepaper.pdf. Referenced April 2023."},{"key":"e_1_3_2_1_16_1","volume-title":"ARM system memory management unit architecture specification \u00e2\u0102\u0164 SMMU architecture version 2.0. https:\/\/developer.arm.com\/documentation\/ihi0070\/latest\/. Referenced","author":"Holdings ARM","year":"2023","unstructured":"Arm. 2023. ARM Holdings. ARM system memory management unit architecture specification \u00e2\u0102\u0164 SMMU architecture version 2.0. https:\/\/developer.arm.com\/documentation\/ihi0070\/latest\/. Referenced April 2023."},{"key":"e_1_3_2_1_17_1","volume-title":"iPerf3: a tool for active measurements of the maximum achievable bandwidth on IP networks. https:\/\/iperf.fr\/. Referenced","year":"2023","unstructured":"Arm. 2023. iPerf3: a tool for active measurements of the maximum achievable bandwidth on IP networks. https:\/\/iperf.fr\/. Referenced April 2023."},{"key":"e_1_3_2_1_18_1","volume-title":"Tech. Rep. UCB\/EECS-2016-17","author":"Asanovic Krste","year":"2016","unstructured":"Krste Asanovic, Rimas Avizienis, Jonathan Bachrach, Scott Beamer, David Biancolin, Christopher Celio, Henry Cook, Daniel Dabbelt, John Hauser, Adam Izraelevitz, et al. 2016. The rocket chip generator. EECS Department, University of California, Berkeley, Tech. Rep. UCB\/EECS-2016-17 (2016)."},{"key":"e_1_3_2_1_19_1","unstructured":"Damien Aumaitre and Christophe Devine. 2018. Subverting Windows 7 \u00d764 kernel with DMA attacks. http:\/\/esec-lab.sogeti.com\/static\/publications\/10-hitbamsterdam-dmaattacks.pdf. Referenced April 2023."},{"key":"e_1_3_2_1_20_1","volume-title":"CURE: A Security Architecture with CUstomizable and Resilient Enclaves. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Bahmani Raad","year":"2021","unstructured":"Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2021. CURE: A Security Architecture with CUstomizable and Resilient Enclaves. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1073--1090. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/bahmani"},{"key":"e_1_3_2_1_21_1","unstructured":"Michael Becher Maximillian Dornseif and Christian Klein. 2005. FireWire: all your memory are belong to us."},{"key":"e_1_3_2_1_22_1","volume-title":"Berkeley Out-of-Order Machine. https:\/\/boom-core.org\/. Referenced","author":"Berkeley UC","year":"2023","unstructured":"UC Berkeley. 2023. Berkeley Out-of-Order Machine. https:\/\/boom-core.org\/. Referenced April 2023."},{"key":"e_1_3_2_1_23_1","volume-title":"Dynamic DMA mapping using the generic device. https:\/\/www.kernel.org\/doc\/Documentation\/DMA-API.txt. Referenced","author":"Bottomley James E.J.","year":"2023","unstructured":"James E.J. Bottomley. 2018. Dynamic DMA mapping using the generic device. https:\/\/www.kernel.org\/doc\/Documentation\/DMA-API.txt. Referenced April 2023."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23448"},{"key":"e_1_3_2_1_25_1","unstructured":"Rory Breuk and Albert Spruyt. 2012. Integrating DMA attacks in exploitation frameworks."},{"key":"e_1_3_2_1_26_1","volume-title":"IceNet: a library of Chisel designs related to networking. https:\/\/chipyard.readthedocs.io\/en\/stable\/Generators\/IceNet.html. Referenced","year":"2023","unstructured":"chipyard. 2023. IceNet: a library of Chisel designs related to networking. https:\/\/chipyard.readthedocs.io\/en\/stable\/Generators\/IceNet.html. Referenced April 2023."},{"key":"e_1_3_2_1_27_1","volume-title":"Tilelink widgets DMA device in chipyard. https:\/\/chipyard.readthedocs.io\/en\/stable\/Customization\/DMA-Devices.html. Referenced","year":"2023","unstructured":"chipyard. 2023. Tilelink widgets DMA device in chipyard. https:\/\/chipyard.readthedocs.io\/en\/stable\/Customization\/DMA-Devices.html. Referenced April 2023."},{"key":"e_1_3_2_1_28_1","volume-title":"AXI Protocol - Strobe Signal Value. https:\/\/community.arm.com\/support-forums\/f\/embedded-forum\/2848\/axi-protocol---strobe-signal-value. Referenced","author":"Arm","year":"2023","unstructured":"Arm community. 2023. AXI Protocol - Strobe Signal Value. https:\/\/community.arm.com\/support-forums\/f\/embedded-forum\/2848\/axi-protocol---strobe-signal-value. Referenced April 2023."},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX Security Symposium. 857--874","author":"Costan Victor","year":"2016","unstructured":"Victor Costan, Ilia A Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation.. In USENIX Security Symposium. 857--874."},{"key":"e_1_3_2_1_31_1","volume-title":"K07357521: Intel Linux kernel driver vulnerability CVE-2019-11165. https:\/\/my.f5.com\/manage\/s\/article\/K07357521. Referenced","author":"Linux CVE.","year":"2023","unstructured":"Linux CVE. 2019. K07357521: Intel Linux kernel driver vulnerability CVE-2019-11165. https:\/\/my.f5.com\/manage\/s\/article\/K07357521. Referenced April 2023."},{"key":"e_1_3_2_1_32_1","volume-title":"Linux Linux Kernel : List of security vulnerabilities. https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-33\/product_id-47\/Linux-Linux-Kernel.html. Referenced","author":"Linux CVE.","year":"2023","unstructured":"Linux CVE. 2023. Linux Linux Kernel : List of security vulnerabilities. https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-33\/product_id-47\/Linux-Linux-Kernel.html. Referenced April 2023."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273440.1250722"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of PacSec Applied Security Conference","author":"Dornseif M.","year":"2004","unstructured":"M. Dornseif. 2004. 0wn3d by an iPod: Firewire\/1394 Issues. Proceedings of PacSec Applied Security Conference (2004). https:\/\/pacsec.jp\/psj04\/psj04-dornseif-e.ppt"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613424.3614293"},{"key":"e_1_3_2_1_36_1","volume-title":"Recent Advances in Intrusion Detection","author":"Duflot Lo\u00efc","unstructured":"Lo\u00efc Duflot, Yves-Alexis Perez, and Benjamin Morin. 2011. What If You Can't Trust Your Network Card?. In Recent Advances in Intrusion Detection, Robin Sommer, Davide Balzarotti, and Gregor Maier (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 378--397."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071130"},{"key":"e_1_3_2_1_38_1","volume-title":"Scalable Memory Protection in the PENGLAI Enclave. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21)","author":"Feng Erhu","year":"2021","unstructured":"Erhu Feng, Xu Lu, Dong Du, Bicheng Yang, Xueqiang Jiang, Yubin Xia, Binyu Zang, and Haibo Chen. 2021. Scalable Memory Protection in the PENGLAI Enclave. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21). 275--294."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132782"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480067"},{"key":"e_1_3_2_1_41_1","volume-title":"http:\/\/osr600doc.sco.com\/en\/HDK_concepts\/ddT_scgth.html. Referenced","author":"SCO Group","year":"2023","unstructured":"SCO Group. 2018. Scatter\/gather operations. http:\/\/osr600doc.sco.com\/en\/HDK_concepts\/ddT_scgth.html. Referenced April 2023."},{"key":"e_1_3_2_1_42_1","volume-title":"Performance-Enhanced Integrity Verification for Large Memories. In 2021 International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, 50--62","author":"Guo Yanan","year":"2021","unstructured":"Yanan Guo, Andrew Zigerelli, Yueqiang Cheng, Youtao Zhang, and Jun Yang. 2021. Performance-Enhanced Integrity Verification for Large Memories. In 2021 International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, 50--62."},{"key":"e_1_3_2_1_43_1","unstructured":"AMD Inc. 2018. AMD IOMMU architectural specification rev 2.00. http:\/\/developer.amd.com\/wordpress\/media\/2012\/10\/488821.pdf. Referenced April 2023."},{"key":"e_1_3_2_1_44_1","volume-title":"Features of the DMA Controller. https:\/\/www.intel.com\/content\/www\/us\/en\/docs\/programmable\/683126\/21-2\/features-of-the-dma-controller.html. Referenced","year":"2023","unstructured":"Intel. 2018. Features of the DMA Controller. https:\/\/www.intel.com\/content\/www\/us\/en\/docs\/programmable\/683126\/21-2\/features-of-the-dma-controller.html. Referenced April 2023."},{"key":"e_1_3_2_1_45_1","volume-title":"Intel TDX Connect TEE-IODevice Guide. https:\/\/cdrdv2-public.intel.com\/772642\/whitepaper-tee-io-device-guide-v0-6-5.pdf. Referenced","year":"2023","unstructured":"Intel. 2018. Intel TDX Connect TEE-IODevice Guide. https:\/\/cdrdv2-public.intel.com\/772642\/whitepaper-tee-io-device-guide-v0-6-5.pdf. Referenced April 2023."},{"key":"e_1_3_2_1_46_1","volume-title":"Support for Intel Memory Protection Extensions (Intel MPX) Technology. https:\/\/www.intel.com\/content\/www\/us\/en\/support\/articles\/000059823\/processors.html. Referenced","year":"2023","unstructured":"Intel. 2018. Support for Intel Memory Protection Extensions (Intel MPX) Technology. https:\/\/www.intel.com\/content\/www\/us\/en\/support\/articles\/000059823\/processors.html. Referenced April 2023."},{"key":"e_1_3_2_1_47_1","volume-title":"Intel Virtualization Technology for Directed I\/O Architecture Specification. https:\/\/cdrdv2-public.intel.com\/671081\/vt-directed-io-spec.pdf. Referenced","year":"2023","unstructured":"Intel. 2023. Intel Virtualization Technology for Directed I\/O Architecture Specification. https:\/\/cdrdv2-public.intel.com\/671081\/vt-directed-io-spec.pdf. Referenced April 2023."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304021"},{"key":"e_1_3_2_1_49_1","volume-title":"Feb","author":"Kaplan David","year":"2017","unstructured":"David Kaplan. 2017. Protecting vm register state with sev-es. White paper, Feb (2017)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00014"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00048"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_53_1","volume-title":"2023 USENIX Annual Technical Conference (USENIX ATC 23)","author":"Li Dingji","year":"2023","unstructured":"Dingji Li, Zeyu Mi, Chenhui Ji, Yifan Tan, Binyu Zang, Haibing Guan, and Haibo Chen. 2023. Bifrost: Analysis and Optimization of Network I\/O Tax in Confidential Virtual Machines. In 2023 USENIX Annual Technical Conference (USENIX ATC 23). USENIX Association, Boston, MA, 1--15. https:\/\/www.usenix.org\/conference\/atc23\/presentation\/li-dingji"},{"key":"e_1_3_2_1_54_1","volume-title":"Encrypted Databases Made Secure Yet Maintainable. In 17th USENIX Symposium on Operating Systems Design and Implementation.","author":"Li Mingyu","year":"2023","unstructured":"Mingyu Li, Xuyang Zhao, Le Chen, Cheng Tan, Huorong Li, Sheng Wang, Zeyu Mi, Yubin Xia, Feifei Li, and Haibo Chen. 2023. Encrypted Databases Made Secure Yet Maintainable. In 17th USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_56_1","volume-title":"17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23)","author":"Mai HaoHui","year":"2023","unstructured":"HaoHui Mai, Jiacheng Zhao, Hongren Zheng, Yiyang Zhao, Zibin Liu, Mingyu Gao, Cong Wang, Huimin Cui, Xiaobing Feng, and Christos Kozyrakis. 2023. Honeycomb: Secure and Efficient GPU Executions via Static Validation. In 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23). USENIX Association, Boston, MA, 155--172. https:\/\/www.usenix.org\/conference\/osdi23\/presentation\/mai"},{"key":"e_1_3_2_1_57_1","volume-title":"Efficient Intra-Operating System Protection Against Harmful DMAs. In 13th USENIX Conference on File and Storage Technologies (FAST 15)","author":"Malka Moshe","year":"2015","unstructured":"Moshe Malka, Nadav Amit, and Dan Tsafrir. 2015. Efficient Intra-Operating System Protection Against Harmful DMAs. In 13th USENIX Conference on File and Storage Technologies (FAST 15). USENIX Association, Santa Clara, CA, 29--44. https:\/\/www.usenix.org\/conference\/fast15\/technical-sessions\/presentation\/malka"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23194"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872379"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173175"},{"key":"e_1_3_2_1_61_1","volume-title":"ACM European Conference on Computer Systems (EuroSys). 395--409","author":"Markuze Alex","year":"2021","unstructured":"Alex Markuze, Shay Vargaftik, Gil Kupfer, Boris Pismenny, Nadav Amit, Adam Morrison, and Dan Tsafrir. 2021. Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU. In ACM European Conference on Computer Systems (EuroSys). 395--409."},{"key":"e_1_3_2_1_62_1","volume-title":"kernel: Exploiting an intentionally vulnerable Linux driver. https:\/\/mdanilor.github.io\/posts\/hello-kernel\/. Referenced","year":"2023","unstructured":"mdanilor. 2020. Hello, kernel: Exploiting an intentionally vulnerable Linux driver. https:\/\/mdanilor.github.io\/posts\/hello-kernel\/. Referenced April 2023."},{"key":"e_1_3_2_1_63_1","unstructured":"NVIDIA. 2023. NVIDIA Deep Learning Accelerator (NVDLA). http:\/\/nvdla.org\/. Referenced April 2023."},{"key":"e_1_3_2_1_64_1","volume-title":"Utilizing the IOMMU Scalably. In 2015 USENIX Annual Technical Conference (USENIX ATC 15)","author":"Peleg Omer","year":"2015","unstructured":"Omer Peleg, Adam Morrison, Benjamin Serebrin, and Dan Tsafrir. 2015. Utilizing the IOMMU Scalably. In 2015 USENIX Annual Technical Conference (USENIX ATC 15). USENIX Association, Santa Clara, CA, 549--562. https:\/\/www.usenix.org\/conference\/atc15\/technical-session\/presentation\/peleg"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00025"},{"key":"e_1_3_2_1_66_1","volume-title":"RISC-V Advanced Interrupt Architecture (AIA). https:\/\/github.com\/riscv\/riscv-aia. Referenced","year":"2023","unstructured":"riscv. 2021. RISC-V Advanced Interrupt Architecture (AIA). https:\/\/github.com\/riscv\/riscv-aia. Referenced April 2023."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.44"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00041"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_70_1","volume-title":"MyTEE: Own the Trusted Execution Environment on Embedded Devices. In 31th Annual Network and Distributed System Security Symposium,(NDSS'24)","author":"Seungkyun Han Jinsoo Jang","year":"2023","unstructured":"Jinsoo Jang Seungkyun Han. 2023. MyTEE: Own the Trusted Execution Environment on Embedded Devices. In 31th Annual Network and Distributed System Security Symposium,(NDSS'24)."},{"key":"e_1_3_2_1_71_1","volume-title":"White Paper","author":"AMD","year":"2020","unstructured":"AMD SEV-SNP. 2020. Strengthening VM isolation with integrity protection and more. White Paper, January (2020)."},{"key":"e_1_3_2_1_72_1","volume-title":"Physical Memory Protection. https:\/\/sifive.github.io\/freedom-metal-docs\/devguide\/pmps.html. Referenced","year":"2023","unstructured":"sifive. 2023. Physical Memory Protection. https:\/\/sifive.github.io\/freedom-metal-docs\/devguide\/pmps.html. Referenced April 2023."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378509"},{"key":"e_1_3_2_1_74_1","volume-title":"SiFive TileLink Speci version 1.8.1. https:\/\/starfivetech.com\/uploads\/tilelink_spec_1.8.1.pdf. Referenced","year":"2023","unstructured":"starfivetech. 2023. SiFive TileLink Speci version 1.8.1. https:\/\/starfivetech.com\/uploads\/tilelink_spec_1.8.1.pdf. Referenced April 2023."},{"key":"e_1_3_2_1_75_1","volume-title":"Detection of Intrusions and Malware","author":"Stewin Patrick","unstructured":"Patrick Stewin and Iurii Bystrov. 2013. Understanding DMA Malware. In Detection of Intrusions and Malware, and Vulnerability Assessment, Ulrich Flegel, Evangelos Markatos, and William Robertson (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 21--41."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00066"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177155"},{"key":"e_1_3_2_1_79_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation (OSDI). 129--145","author":"Tai Amy","year":"2021","unstructured":"Amy Tai, Igor Smolyar, Michael Wei, and Dan Tsafrir. 2021. Optimizing storage I\/O with calibrated interrupts. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). 129--145."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/378995.379237"},{"key":"e_1_3_2_1_81_1","volume-title":"Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC'20). USENIX Association, USA, Article 32","author":"Tian Kun","year":"2020","unstructured":"Kun Tian, Yu Zhang, Luwei Kang, Yan Zhao, and Yaozu Dong. 2020. CoIOMMU: A Virtual IOMMU with Cooperative DMA Buffer Tracking for Efficient Memory Management in Direct I\/O. In Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC'20). USENIX Association, USA, Article 32, 14 pages."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771782"},{"key":"e_1_3_2_1_83_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Tsai Chia-Che","year":"2020","unstructured":"Chia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, and Donald E Porter. 2020. Civet: An efficient java partitioning framework for hardware enclaves. In 29th USENIX Security Symposium (USENIX Security 20). 505--522."},{"key":"e_1_3_2_1_84_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In 27th USENIX Security Symposium (USENIX Security 18). 991--1008."},{"key":"e_1_3_2_1_85_1","volume-title":"Verilator converts Verilog and SystemVerilog hardware description language (HDL) designs into a C++ or SystemC model. https:\/\/www.veripool.org\/verilator\/. Referenced","year":"2023","unstructured":"veripool. 2023. Verilator converts Verilog and SystemVerilog hardware description language (HDL) designs into a C++ or SystemC model. https:\/\/www.veripool.org\/verilator\/. Referenced April 2023."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0052"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2017.32"},{"key":"e_1_3_2_1_88_1","volume-title":"Graviton: Trusted Execution Environments on GPUs. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Volos Stavros","year":"2018","unstructured":"Stavros Volos, Kapil Vaswani, and Rodrigo Bruno. 2018. Graviton: Trusted Execution Environments on GPUs. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). 681--696."},{"key":"e_1_3_2_1_89_1","volume-title":"Advanced eXtensible Interface. https:\/\/en.wikipedia.org\/wiki\/Advanced_eXtensible_Interface. Referenced","year":"2023","unstructured":"wikipedia. 2023. Advanced eXtensible Interface. https:\/\/en.wikipedia.org\/wiki\/Advanced_eXtensible_Interface. Referenced April 2023."},{"key":"e_1_3_2_1_90_1","volume-title":"Direct memory access - Burst mode. https:\/\/en.wikipedia.org\/wiki\/Direct_memory_access. Referenced","year":"2023","unstructured":"wikipedia. 2023. Direct memory access - Burst mode. https:\/\/en.wikipedia.org\/wiki\/Direct_memory_access. Referenced April 2023."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605429"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00004"},{"key":"e_1_3_2_1_93_1","volume-title":"Recovering OpenSSL ECDSA nonces using the FLUSH+ RELOAD cache side-channel attack. Cryptology ePrint Archive","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Naomi Benger. 2014. Recovering OpenSSL ECDSA nonces using the FLUSH+ RELOAD cache side-channel attack. Cryptology ePrint Archive (2014)."},{"key":"e_1_3_2_1_94_1","volume-title":"swiotlb: 64-bit DMA buffer. https:\/\/lwn.net\/Articles\/845096\/. Referenced","author":"Zhang Dongli","year":"2023","unstructured":"Dongli Zhang. 2021. swiotlb: 64-bit DMA buffer. https:\/\/lwn.net\/Articles\/845096\/. Referenced April 2023."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/1037949.1024403"}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2","location":"La Jolla CA USA","acronym":"ASPLOS '24","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640378","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620665.3640378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:41Z","timestamp":1750291421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640378"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,27]]},"references-count":94,"alternative-id":["10.1145\/3620665.3640378","10.1145\/3620665"],"URL":"https:\/\/doi.org\/10.1145\/3620665.3640378","relation":{},"subject":[],"published":{"date-parts":[[2024,4,27]]},"assertion":[{"value":"2024-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}