{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:10Z","timestamp":1755882610386,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"New Energy and Industrial Technology Development Organization (NEDO)","award":["JPNP23013"],"award-info":[{"award-number":["JPNP23013"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3664477","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Comparative Analysis and Implementation of Jump Address Masking for Preventing TEE Bypassing Fault Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7495-681X","authenticated-orcid":false,"given":"Shoei","family":"Nashimoto","sequence":"first","affiliation":[{"name":"Mitsubishi Electric Corporation, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9754-6792","authenticated-orcid":false,"given":"Rei","family":"Ueno","sequence":"additional","affiliation":[{"name":"Tohoku University, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0864-3126","authenticated-orcid":false,"given":"Naofumi","family":"Homma","sequence":"additional","affiliation":[{"name":"Tohoku University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2010.5560194"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"volume-title":"Advances in Cryptology-CRYPTO\u201997","author":"Biham Eli","key":"e_1_3_2_1_3_1","unstructured":"Eli Biham and Adi Shamir. 1997. Differential fault analysis of secret key cryptosystems. In Advances in Cryptology-CRYPTO\u201997. Springer, 513\u2013525."},{"volume-title":"Advances in Cryptology-EUROCRYPT","author":"Boneh Dan","key":"e_1_3_2_1_4_1","unstructured":"Dan Boneh, Richard\u00a0A DeMillo, and Richard\u00a0J Lipton. 1997. On the Importance of Checking Cryptographic Protocols for Faults. In Advances in Cryptology-EUROCRYPT\u2019 97. Springer, 37\u201351."},{"volume-title":"Smart Card Research and Advanced Applications","author":"Bouffard Guillaume","key":"e_1_3_2_1_5_1","unstructured":"Guillaume Bouffard, Julien Iguchi-Cartigny, and Jean-Louis Lanet. 2011. Combined software and hardware attacks on the java card control flow. In Smart Card Research and Advanced Applications. Springer, 283\u2013296."},{"key":"e_1_3_2_1_6_1","volume-title":"Shaping the Glitch: Optimizing Voltage Fault Injection Attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Bozzato Claudio","year":"2019","unstructured":"Claudio Bozzato, Riccardo Focardi, and Francesco Palmarini. 2019. Shaping the Glitch: Optimizing Voltage Fault Injection Attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems (2019), 199\u2013224."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484779"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230842"},{"key":"e_1_3_2_1_9_1","volume-title":"CCFI-Cache: A Transparent and Flexible Hardware Protection for Code and Control-Flow Integrity. In 2018 21st Euromicro Conference on Digital System Design (DSD). IEEE, 529\u2013536","author":"Danger Jean-Luc","year":"2018","unstructured":"Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich K\u00fchne, Abdelmalek\u00a0Si Merabet, and Micha\u00ebl Timbert. 2018. CCFI-Cache: A Transparent and Flexible Hardware Protection for Code and Control-Flow Integrity. In 2018 21st Euromicro Conference on Digital System Design (DSD). IEEE, 529\u2013536."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-021-09398-9"},{"key":"e_1_3_2_1_11_1","volume-title":"ascon-c. https:\/\/github.com\/ascon\/ascon-c. Accessed","author":"Dobraunig Christoph","year":"2024","unstructured":"Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schl\u00e4ffer. 2022. ascon-c. https:\/\/github.com\/ascon\/ascon-c. Accessed 28 February 2024."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2232038"},{"volume-title":"Introduction to Trusted Execution Environments. https:\/\/globalplatform.org\/wp-content\/uploads\/2018\/05\/Introduction-to-Trusted-Execution-Environment-15May2018.pdf. Accessed","year":"2024","key":"e_1_3_2_1_13_1","unstructured":"GlobalPlatform. 2018. Introduction to Trusted Execution Environments. https:\/\/globalplatform.org\/wp-content\/uploads\/2018\/05\/Introduction-to-Trusted-Execution-Environment-15May2018.pdf. Accessed 01 February 2024."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830563"},{"key":"e_1_3_2_1_15_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Kenjar Zijo","year":"2020","unstructured":"Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, and Ahmad-Reza Sadeghi. 2020. V0LTpwn: Attacking x86 Processor Integrity from Software. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1445\u20131461. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/kenjar"},{"volume-title":"Tiny AES in C. https:\/\/github.com\/kokke\/tiny-AES-c. Accessed","year":"2023","key":"e_1_3_2_1_16_1","unstructured":"kokke. 2021. Tiny AES in C. https:\/\/github.com\/kokke\/tiny-AES-c. Accessed 7 September 2023."},{"key":"e_1_3_2_1_17_1","volume-title":"New Hash Functions for Message Authentication. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 301\u2013310","author":"Krawczyk Hugo","year":"1995","unstructured":"Hugo Krawczyk. 1995. New Hash Functions for Message Authentication. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 301\u2013310."},{"key":"e_1_3_2_1_18_1","unstructured":"Niclas K\u00fchnapfel Christian Werling and Hans\u00a0Niklas Jacob. 2023. Back in the Driver\u2019s Seat: Recovering Critical Data from Tesla Autopilot Using Voltage Glitching. https:\/\/media.ccc.de\/v\/37c3-12144-back_in_the_driver_s_seat_recovering_critical_data_from_tesla_autopilot_using_voltage_glitching. Accessed 18 January 2024."},{"key":"e_1_3_2_1_19_1","volume-title":"keystone-sdk. https:\/\/github.com\/keystone-enclave\/keystone-sdk\/tree\/master\/sdk. Accessed","author":"Lee Dayeol","year":"2024","unstructured":"Dayeol Lee. 2021. keystone-sdk. https:\/\/github.com\/keystone-enclave\/keystone-sdk\/tree\/master\/sdk. Accessed 23 June 2024."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_21_1","volume-title":"OP-TEE: Open Portable Trusted Execution Environment. https:\/\/www.op-tee.org\/. Accessed","author":"Limited Linaro","year":"2024","unstructured":"Linaro Limited. 2024. OP-TEE: Open Portable Trusted Execution Environment. https:\/\/www.op-tee.org\/. Accessed 20 May 2024."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0013-2"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Yifan Lu. 2019. Injecting Software Vulnerabilities with Voltage Glitching. https:\/\/doi.org\/10.48550\/ARXIV.1903.08102","DOI":"10.48550\/ARXIV.1903.08102"},{"key":"e_1_3_2_1_24_1","unstructured":"Alyssa Milburn Niek Timmers Nils Wiersma Ramiro Pareja and Santiago Cordoba. 2018. There Will Be Glitches: Extracting and Analyzing Automotive Firmware Efficiently. Black Hat USA."},{"key":"e_1_3_2_1_25_1","unstructured":"Nimish Mishra Anirban Chakraborty and Debdeep Mukhopadhyay. 2022. Breaking Cross-world isolation on ARM TrustZone through EM Faults Coredumps and UUID Confusion. https:\/\/people.linaro.org\/\u00a0joakim.bech\/reports\/Breaking_cross-world_isolation_on_ARM_TrustZone_through_EM_faults_coredumps_and_UUID_confusion.pdf. (2022). Accessed January 17 2024."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Nimish Mishra Anirban Chakraborty and Debdeep Mukhopadhyay. 2024. Faults in Our Bus: Novel Bus Fault Attack to Break ARM TrustZone. In Network and distributed system security symposium.","DOI":"10.14722\/ndss.2024.24499"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.9"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0077-7"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103180"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0136-3"},{"key":"e_1_3_2_1_32_1","volume-title":"Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Nashimoto Shoei","year":"2022","unstructured":"Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, and Naofumi Homma. 2022. Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure. IACR Transactions on Cryptographic Hardware and Embedded Systems (2022), 28\u201368."},{"key":"e_1_3_2_1_33_1","volume-title":"13th USENIX Workshop on Offensive Technologies (WOOT 19)","author":"O\u2019Flynn Colin","year":"2019","unstructured":"Colin O\u2019Flynn. 2019. MIN()imum Failure:EMFI Attacks against USB Stacks. In 13th USENIX Workshop on Offensive Technologies (WOOT 19)."},{"volume-title":"derrek, and naehrwert","year":"2017","key":"e_1_3_2_1_34_1","unstructured":"plutoo, derrek, and naehrwert. 2017. Console Security - Switch. https:\/\/media.ccc.de\/v\/34c3-8941-console_security_-_switch. Accessed 5 December 2022."},{"key":"e_1_3_2_1_35_1","volume-title":"https:\/\/source.android.com\/docs\/security\/features\/trusty. Accessed","author":"Open\u00a0Source Project Android","year":"2024","unstructured":"Android Open\u00a0Source Project. 2024. Trusty TEE. https:\/\/source.android.com\/docs\/security\/features\/trusty. Accessed 20 May 2024."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3141234"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354201"},{"key":"e_1_3_2_1_38_1","volume-title":"AirTag of the Clones: Shenanigans with Liberated Item Finders. In 2022 IEEE Security and Privacy Workshops (SPW). IEEE, 301\u2013311","author":"Roth Thomas","year":"2022","unstructured":"Thomas Roth, Fabian Freyer, Matthias Hollick, and Jiska Classen. 2022. AirTag of the Clones: Shenanigans with Liberated Item Finders. In 2022 IEEE Security and Privacy Workshops (SPW). IEEE, 301\u2013311."},{"volume-title":"Vol.\u00a01","author":"Sabt Mohamed","key":"e_1_3_2_1_39_1","unstructured":"Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah. 2015. Trusted Execution Environment: What It is, and What It is Not. In 2015 IEEE Trustcom\/BigDataSE\/Ispa, Vol.\u00a01. IEEE, 57\u201364."},{"key":"e_1_3_2_1_40_1","volume-title":"FIPAC: Thwarting Fault-and Software-Induced Control-Flow Attacks with ARM Pointer Authentication. In International Workshop on Constructive Side-Channel Analysis and Secure Design. Springer, 100\u2013124","author":"Schilling Robert","year":"2022","unstructured":"Robert Schilling, Pascal Nasahl, and Stefan Mangard. 2022. FIPAC: Thwarting Fault-and Software-Induced Control-Flow Attacks with ARM Pointer Authentication. In International Workshop on Constructive Side-Channel Analysis and Secure Design. Springer, 100\u2013124."},{"key":"e_1_3_2_1_41_1","volume-title":"Part 4: The RISC-V Code Models. https:\/\/www.sifive.com\/blog\/all-aboard-part-4-risc-v-code-models. Accessed","author":"Aboard All","year":"2024","unstructured":"SiFive. 2017. All Aboard, Part 4: The RISC-V Code Models. https:\/\/www.sifive.com\/blog\/all-aboard-part-4-risc-v-code-models. Accessed 16 February 2024."},{"key":"e_1_3_2_1_42_1","volume-title":"IDEFENSE","author":"Silberman Peter","year":"2004","unstructured":"Peter Silberman and Richard Johnson. 2004. A Comparison of Buffer Overflow Prevention Implementations and Weaknesses. IDEFENSE, August (2004)."},{"key":"e_1_3_2_1_43_1","volume-title":"Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses. In 2021 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 400\u2013412","author":"Spensky Chad","year":"2021","unstructured":"Chad Spensky, Aravind Machiry, Nathan Burow, Hamed Okhravi, Rick Housley, Zhongshu Gu, Hani Jamjoom, Christopher Kruegel, and Giovanni Vigna. 2021. Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses. In 2021 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 400\u2013412."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33491-7_3"},{"key":"e_1_3_2_1_45_1","volume-title":"CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Tang Adrian","year":"2017","unstructured":"Adrian Tang, Simha Sethumadhavan, and Salvatore Stolfo. 2017. CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management. In 26th USENIX Security Symposium (USENIX Security 17). 1057\u20131074."},{"key":"e_1_3_2_1_46_1","volume-title":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2019-15894. Accessed 16 Feburary","author":"The MITRE Corporation","year":"2024","unstructured":"The MITRE Corporation. 2019. CVE-2019-15894. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2019-15894. Accessed 16 Feburary 2024."},{"key":"e_1_3_2_1_47_1","volume-title":"2021 CWE Most Important Hardware Weaknesses. https:\/\/cwe.mitre.org\/scoring\/lists\/2021_CWE_MIHW.html. Accessed 16 Feburary","author":"The MITRE Corporation","year":"2024","unstructured":"The MITRE Corporation. 2021. 2021 CWE Most Important Hardware Weaknesses. https:\/\/cwe.mitre.org\/scoring\/lists\/2021_CWE_MIHW.html. Accessed 16 Feburary 2024."},{"key":"e_1_3_2_1_48_1","volume-title":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2022-42784. Accessed 16 Feburary","author":"The MITRE Corporation","year":"2024","unstructured":"The MITRE Corporation. 2022. CVE-2022-42784. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2022-42784. Accessed 16 Feburary 2024."},{"key":"e_1_3_2_1_49_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 404\u2013409","author":"Theissing Nikolaus","year":"2013","unstructured":"Nikolaus Theissing, Dominik Merli, Michael Smola, Frederic Stumpf, and Georg Sigl. 2013. Comprehensive Analysis of Software Countermeasures Against Fault Attacks. In 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 404\u2013409."},{"key":"e_1_3_2_1_50_1","volume-title":"Bypassing Secure Boot using Fault Injection. black Hat Europe","author":"Timmers N","year":"2016","unstructured":"N Timmers and A Spruyt. 2016. Bypassing Secure Boot using Fault Injection. black Hat Europe (2016)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2016.18"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72354-7_3"},{"key":"e_1_3_2_1_53_1","volume-title":"Laser-Induced Fault Injection on Smartphone Bypassing the Secure Boot","author":"Vasselle Aur\u00e9lien","year":"2018","unstructured":"Aur\u00e9lien Vasselle, Hugues Thiebeauld, Quentin Maouhoub, Adele Morisset, and Sebastien Ermeneux. 2018. Laser-Induced Fault Injection on Smartphone Bypassing the Secure Boot. IEEE Trans. Comput. (2018)."},{"key":"e_1_3_2_1_54_1","volume-title":"The RISC-V Instruction Set Manual Volume II: Privileged Architecture. https:\/\/riscv.org\/specifications\/privileged-isa. Accessed","author":"Waterman Andrew","year":"2022","unstructured":"Andrew Waterman, Krste Asanovic, and John Hauser. 2021. The RISC-V Instruction Set Manual Volume II: Privileged Architecture. https:\/\/riscv.org\/specifications\/privileged-isa. Accessed 6 September 2022."},{"key":"e_1_3_2_1_55_1","volume-title":"Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla\u2019s x86-Based Seat Heater. black hat USA","author":"Werling Christian","year":"2023","unstructured":"Christian Werling, Niclas K\u00fchnapfel, Hans\u00a0Niklas Jacob, and Oleg Drokin. 2023. Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla\u2019s x86-Based Seat Heater. black hat USA (2023)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2017.15"},{"key":"e_1_3_2_1_57_1","unstructured":"Marc Witteman. 2008. Secure Application Programming in the presence of Side Channel Attacks. Riscure Whiter Paper."},{"key":"e_1_3_2_1_58_1","volume-title":"Linux Security Module Framework. In Ottawa Linux Symposium, Vol.\u00a08032","author":"Wright Chris","year":"2002","unstructured":"Chris Wright, Crispin Cowan, James Morris, Stephen Smalley, and Greg Kroah-Hartman. 2002. Linux Security Module Framework. In Ottawa Linux Symposium, Vol.\u00a08032. 6\u201316."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2016.21"},{"volume-title":"SMACD\/PRIME 2021","author":"Zgheib Anthony","key":"e_1_3_2_1_60_1","unstructured":"Anthony Zgheib, Olivier Potin, Jean-Baptiste Rigaud, and Jean-Max Dutertre. 2021. Extending a RISC-V core with an AES hardware accelerator to meet IOT constraints. In SMACD\/PRIME 2021; International Conference on SMACD and 16th Conference on PRIME. VDE, 1\u20134."}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664477","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3664477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:50:47Z","timestamp":1755881447000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664477"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":60,"alternative-id":["10.1145\/3664476.3664477","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3664477","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}