{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T15:30:49Z","timestamp":1773588649352,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":93,"publisher":"ACM","funder":[{"name":"National Research Foundation of Korea&#x28;NRF&#x29; grant funded by the Korea Government &#x28;MSIT&#x29;","award":["RS-2023-00240697"],"award-info":[{"award-number":["RS-2023-00240697"]}]},{"name":"Institute of Information &amp; communications Technology Planning &amp; Evaluation&#x28;IITP&#x29; grant funded by the Korea government&#x28;MSIT&#x29;","award":["2020-0-01840"],"award-info":[{"award-number":["2020-0-01840"]}]},{"name":"Korea Research Institute for Defense Technology Planning and Advancement &#x28;KRIT&#x29; grant funded by the Korea government &#x28;Defense Acquisition Program Administration&#x29;","award":["KRIT-CT-24-001"],"award-info":[{"award-number":["KRIT-CT-24-001"]}]},{"name":"Institute of Information &amp; communications Technology Planning &amp; Evaluation &#x28;IITP&#x29; grant funded by the Korea government&#x28;MSIT&#x29;","award":["2021-0-00724"],"award-info":[{"award-number":["2021-0-00724"]}]},{"name":"Institute for Information &amp; communications Technology Planning &amp; Evaluation&#x28;IITP&#x29; grant funded by the Korea government &#x28;MSIT&#x29;","award":["RS-2022-II221200"],"award-info":[{"award-number":["RS-2022-II221200"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,3,22]]},"DOI":"10.1145\/3779212.3790242","type":"proceedings-article","created":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:55:26Z","timestamp":1773150926000},"page":"2125-2140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust-V: Toward Secure and Reliable Storage for Trusted Execution Environments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0417-1734","authenticated-orcid":false,"given":"SeungKyun","family":"Han","sequence":"first","affiliation":[{"name":"Chungnam National University, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7061-6085","authenticated-orcid":false,"given":"Jiyeon","family":"Yang","sequence":"additional","affiliation":[{"name":"Chungnam National University, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2070-2408","authenticated-orcid":false,"given":"Jinsoo","family":"Jang","sequence":"additional","affiliation":[{"name":"Chungnam National University, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2026,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/source.android.com\/docs\/security\/features\/trusty. [Online","author":"Source Project Android Open","year":"2025","unstructured":"Android Open Source Project. 2025. Trusty TEE. https:\/\/source.android.com\/docs\/security\/features\/trusty. [Online; accessed 18-December-2025]."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993540"},{"key":"e_1_3_2_1_3_1","volume-title":"Next ARM Architecture Reference Manual ARMv7-A and ARMv7-R edition. https:\/\/developer.arm.com\/documentation\/ddi0406\/c. [Online","author":"ARM.","year":"2025","unstructured":"ARM. 2011. Next ARM Architecture Reference Manual ARMv7-A and ARMv7-R edition. https:\/\/developer.arm.com\/documentation\/ddi0406\/c. [Online; accessed 14-December-2025]."},{"key":"e_1_3_2_1_4_1","volume-title":"TrustZone for Cortex-A. https:\/\/www.arm.com\/en\/technologies\/trustzone-for cortex-a. [Online","author":"ARM.","year":"2024","unstructured":"ARM. 2024. TrustZone for Cortex-A. https:\/\/www.arm.com\/en\/technologies\/trustzone-for cortex-a. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_5_1","volume-title":"TrustZone for Cortex-M. https:\/\/www.arm.com\/technologies\/trustzone-for-cortex-m. [Online","author":"ARM.","year":"2024","unstructured":"ARM. 2024. TrustZone for Cortex-M. https:\/\/www.arm.com\/technologies\/trustzone-for-cortex-m. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_6_1","volume-title":"CoreLink TrustZone Address Space Controller TZC-380 Technical Reference Manual r0p1. https:\/\/developer.arm.com\/documentation\/ddi0431\/c\/Cacddhga. [Online","author":"ARM.","year":"2025","unstructured":"ARM. 2025. CoreLink TrustZone Address Space Controller TZC-380 Technical Reference Manual r0p1. https:\/\/developer.arm.com\/documentation\/ddi0431\/c\/Cacddhga. [Online; accessed 14-August-2025]."},{"key":"e_1_3_2_1_7_1","volume-title":"Learn the architecture - AArch64 virtualization Guide. https:\/\/developer.arm.com\/documentation\/102142\/0100\/ Virtualization-host-extensions. [Online","author":"ARM.","year":"2025","unstructured":"ARM. 2025. Learn the architecture - AArch64 virtualization Guide. https:\/\/developer.arm.com\/documentation\/102142\/0100\/ Virtualization-host-extensions. [Online; accessed 14-August-2025]."},{"key":"e_1_3_2_1_8_1","volume-title":"Memory Protection Unit. https:\/\/developer.arm. com\/documentation\/107565\/0101\/Memory-protection\/Memory-Protection-Unit. [Online","author":"ARM.","year":"2025","unstructured":"ARM. 2025. Memory Protection Unit. https:\/\/developer.arm. com\/documentation\/107565\/0101\/Memory-protection\/Memory-Protection-Unit. [Online; accessed 14-August-2025]."},{"key":"e_1_3_2_1_9_1","volume-title":"TrustZone Support in the Cache Controller. https:\/\/developer.arm.com\/documentation\/ddi0246\/a\/functional-overview\/trustzone-support-in-the-cache-controller. [Online","author":"ARM.","year":"2025","unstructured":"ARM. 2025. TrustZone Support in the Cache Controller. https:\/\/developer.arm.com\/documentation\/ddi0246\/a\/functional-overview\/trustzone-support-in-the-cache-controller. [Online; accessed 21-April-2025]."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/developer.arm.com\/documentation\/ 102140\/0200\/Watchpoints. [Online","author":"Watchpoints ARM.","year":"2025","unstructured":"ARM. 2025. Watchpoints. https:\/\/developer.arm.com\/documentation\/ 102140\/0200\/Watchpoints. [Online; accessed 14-August-2025]."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3637644"},{"key":"e_1_3_2_1_12_1","unstructured":"SD Association. 2023. SD CARD Physical Layer Simplified Specification. https:\/\/www.sdcard.org\/downloads\/pls\/pdf\/?p= Part1_Physical_Layer_Simplified_Specification_Ver9.10.jpg&f=Part1PhysicalLayerSimplifiedSpecificationVer9.10Fin_20231201.pdf&e=EN_SS9_1. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/www.techtarget.com\/searchitoperations\/definition\/AMD-V-AMD-virtualization. [Online","author":"Awati Rahul","year":"2025","unstructured":"Rahul Awati. 2023. AMD Virtualization (AMD-V). https:\/\/www.techtarget.com\/searchitoperations\/definition\/AMD-V-AMD-virtualization. [Online; accessed 14-December-2025]."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23009"},{"key":"e_1_3_2_1_16_1","first-page":"1073","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Bahmani Raad","year":"2021","unstructured":"Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2021. {CURE}: A security architecture with {CUstomizable} and resilient enclaves. In 30th USENIX Security Symposium (USENIX Security 21). 1073-1090."},{"key":"e_1_3_2_1_17_1","volume-title":"SANCTUARY: ARMing TrustZone with User-space Enclaves.. In NDSS.","author":"Brasser Ferdinand","year":"2019","unstructured":"Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2019. SANCTUARY: ARMing TrustZone with User-space Enclaves.. In NDSS."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906390"},{"key":"e_1_3_2_1_19_1","unstructured":"Yeongpil Cho Donghyun Kwon Hayoon Yi and Yunheung Paek. 2017. Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM.. In NDSS."},{"key":"e_1_3_2_1_20_1","first-page":"565","volume-title":"2016 USENIX Annual Technical Conference (USENIX ATC 16)","author":"Cho Yeongpil","year":"2016","unstructured":"Yeongpil Cho, Junbum Shin, Donghyun Kwon, MyungJoo Ham, Yuna Kim, and Yunheung Paek. 2016. {Hardware-Assisted} {On-Demand} Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices. In 2016 USENIX Annual Technical Conference (USENIX ATC 16). 565-578."},{"key":"e_1_3_2_1_21_1","volume-title":"The current state of kernel page-table isolation. https:\/\/lwn.net\/Articles\/741878\/. [Online","author":"Corbet Jonathan","year":"2024","unstructured":"Jonathan Corbet. 2017. The current state of kernel page-table isolation. https:\/\/lwn.net\/Articles\/741878\/. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_22_1","volume-title":"KAISER: hiding the kernel from user space. https:\/\/lwn.net\/Articles\/738975\/. [Online","author":"Corbet Jonathan","year":"2024","unstructured":"Jonathan Corbet. 2017. KAISER: hiding the kernel from user space. https:\/\/lwn.net\/Articles\/738975\/. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_23_1","first-page":"857","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Costan Victor","year":"2016","unstructured":"Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal hardware extensions for strong software isolation. In 25th USENIX Security Symposium (USENIX Security 16). 857-874."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694386"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560627"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24112"},{"key":"e_1_3_2_1_27_1","unstructured":"Digi International Inc. 2025. 8. Initialize the secure storage for Trusty OS | ConnectCore 8X. https:\/\/docs.digi.com\/resources\/documentation\/digidocs\/embedded\/android\/dea11\/cc8x\/android-trustfence_t_secure-boot-init-secure-storage. [Online; accessed 18-December-2025]."},{"key":"e_1_3_2_1_28_1","unstructured":"eBPF. 2025. Linux Loadable Kernel Module HOWTO. https:\/\/ebpf.io\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640378"},{"key":"e_1_3_2_1_30_1","volume-title":"https:\/\/five-embeddev. com\/riscv-debug-spec\/v0.13-release\/trigger.html. [Online","author":"Foundation RISC-V","year":"2025","unstructured":"RISC-V Foundation. 2025. Trigger Module. https:\/\/five-embeddev. com\/riscv-debug-spec\/v0.13-release\/trigger.html. [Online; accessed 01-August-2025]."},{"key":"e_1_3_2_1_31_1","volume-title":"Trusted Platform Module (TPM) Summary. https:\/\/trustedcomputinggroup.org\/resource\/trusted-platform-module-tpm-summary\/. [Online","author":"Trusted Computing Group","year":"2025","unstructured":"Trusted Computing Group. 2016. Trusted Platform Module (TPM) Summary. https:\/\/trustedcomputinggroup.org\/resource\/trusted-platform-module-tpm-summary\/. [Online; accessed 21-April-2025]."},{"key":"e_1_3_2_1_32_1","volume-title":"Tech: AP-TEE. https:\/\/lists.riscv.org\/g\/tech-ap-tee. [Online","author":"RISC-V Working Groups","year":"2024","unstructured":"RISC-V Working Groups. 2024. Tech: AP-TEE. https:\/\/lists.riscv.org\/g\/tech-ap-tee. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_33_1","volume-title":"Tech: AP-TEE-IO. https:\/\/lists.riscv.org\/g\/tech-ap-tee-io. [Online","author":"RISC-V Working Groups","year":"2024","unstructured":"RISC-V Working Groups. 2024. Tech: AP-TEE-IO. https:\/\/lists.riscv.org\/g\/tech-ap-tee-io. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_34_1","volume-title":"Tech: Memory Tagging. https:\/\/lists.riscv.org\/g\/tech-memory-tagging. [Online","author":"RISC-V Working Groups","year":"2024","unstructured":"RISC-V Working Groups. 2024. Tech: Memory Tagging. https:\/\/lists.riscv.org\/g\/tech-memory-tagging. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_35_1","volume-title":"Tech: sPMP. https:\/\/lists.riscv.org\/g\/tech-spmp. [Online","author":"RISC-V Working Groups","year":"2024","unstructured":"RISC-V Working Groups. 2024. Tech: sPMP. https:\/\/lists.riscv.org\/g\/tech-spmp. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_36_1","volume-title":"ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings 9. Springer, 161-176","author":"Gruss Daniel","year":"2017","unstructured":"Daniel Gruss, Moritz Lipp, Michael Schwarz, Richard Fellner, Cl\u00e9mentine Maurice, and Stefan Mangard. 2017. Kaslr is dead: long live kaslr In Engineering Secure Software and Systems: 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings 9. Springer, 161-176."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081349"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_3_2_1_39_1","unstructured":"Seung-Kyun Han and Jinsoo Jang. 2023. MyTEE: Own the Trusted Execution Environment on Embedded Devices.. In NDSS."},{"key":"e_1_3_2_1_40_1","unstructured":"Festus Hategekimana and Chandra Nelogal. [n.d.]. Enhancing Data Encryption Capabilities in the Data Center with the NVM Express Key Per I\/O Feature. https:\/\/nvmexpress.org\/enhancing-data-encryption-capabilities-in-the-data-center-with-the-nvm-express-key-per-i-o-feature\/. [Online; accessed 14-December-2025]."},{"key":"e_1_3_2_1_41_1","first-page":"541","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Hua Zhichao","year":"2017","unstructured":"Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, and Haibing Guan. 2017. {vTZ}: Virtualizing {ARM} {TrustZone}. In 26th USENIX Security Symposium (USENIX Security 17). 541-556."},{"key":"e_1_3_2_1_42_1","volume-title":"Intel\u00ae Virtualization Technology Specification for the IA-32 Intel\u00ae Architecture. https:\/\/kib.kiev.ua\/x86docs\/Intel\/VT-x\/C97063-002.pdf. [Online","year":"2025","unstructured":"Intel. 2005. Intel\u00ae Virtualization Technology Specification for the IA-32 Intel\u00ae Architecture. https:\/\/kib.kiev.ua\/x86docs\/Intel\/VT-x\/C97063-002.pdf. [Online; accessed 14-December-2025]."},{"key":"e_1_3_2_1_43_1","volume-title":"Introduction to Intel\u00ae SGX Sealing. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/introduction-to-intel-sgx-sealing.html. [Online","year":"2025","unstructured":"Intel. 2016. Introduction to Intel\u00ae SGX Sealing. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/introduction-to-intel-sgx-sealing.html. [Online; accessed 21-April-2025]."},{"key":"e_1_3_2_1_44_1","unstructured":"Intel. 2019. Trusted Time and Monotonic Counters with Intel\u00ae Software Guard Extensions Platform Services. https:\/\/www.intel.com\/content\/www\/us\/en\/content-details\/671564\/trusted-time-and-monotonic-counters-with-intel-software-guard-extensions-platform-services.html. [Online; accessed 25-July-2025]."},{"key":"e_1_3_2_1_45_1","volume-title":"Intel\u00ae Software Guard Extensions (Intel\u00ae SGX). https:\/\/www.intel.com\/content\/www\/us\/en\/products\/docs\/accelerator-engines\/software-guard-extensions.html. [Online","year":"2024","unstructured":"Intel. 2024. Intel\u00ae Software Guard Extensions (Intel\u00ae SGX). https:\/\/www.intel.com\/content\/www\/us\/en\/products\/docs\/accelerator-engines\/software-guard-extensions.html. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_46_1","volume-title":"https:\/\/lf-riscv.atlassian.net\/wiki\/spaces\/HOME\/pages\/16154732\/Ratified Extensions. [Online","author":"International RISC-V","year":"2025","unstructured":"RISC-V International. 2025. Ratified Extensions. https:\/\/lf-riscv.atlassian.net\/wiki\/spaces\/HOME\/pages\/16154732\/Ratified Extensions. [Online; accessed 01-August-2025]."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2622261"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3389023"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3152555"},{"key":"e_1_3_2_1_50_1","first-page":"437","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Jia Yuekai","year":"2022","unstructured":"Yuekai Jia, Shuang Liu, Wenhao Wang, Yu Chen, Zhengde Zhai, Shoumeng Yan, and Zhengyu He. 2022. {HyperEnclave}: An open and cross-platform trusted execution environment. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). 437-454."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3399742"},{"key":"e_1_3_2_1_52_1","volume-title":"Dorami: Privilege Separating Security Monitor on RISC-V TEEs. arXiv preprint arXiv:2410.03653","author":"Kuhne Mark","year":"2024","unstructured":"Mark Kuhne, Stavros Volos, and Shweta Shinde. 2024. Dorami: Privilege Separating Security Monitor on RISC-V TEEs. arXiv preprint arXiv:2410.03653 (2024)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2910861"},{"key":"e_1_3_2_1_54_1","volume-title":"BL808 Reference Manual. https:\/\/files.pine64.org\/doc\/datasheet\/ox64\/BL808_RM_en_1.0(open).pdf. [Online","author":"Lab Bouffalo","year":"2024","unstructured":"Bouffalo Lab. 2022. BL808 Reference Manual. https:\/\/files.pine64.org\/doc\/datasheet\/ox64\/BL808_RM_en_1.0(open).pdf. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243748"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210334"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742676"},{"key":"e_1_3_2_1_59_1","volume-title":"arXiv preprint arXiv:1801.01207","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown. arXiv preprint arXiv:1801.01207 (2018)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00088"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3389027"},{"key":"e_1_3_2_1_64_1","volume-title":"QingKeV2 Processor Manual. https:\/\/www.wch-ic.com\/downloads\/QingKeV2_Processor_ Manual_PDF.html. [Online","year":"2024","unstructured":"NanjingQinhengMicroelectronics. 2024. QingKeV2 Processor Manual. https:\/\/www.wch-ic.com\/downloads\/QingKeV2_Processor_ Manual_PDF.html. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_65_1","volume-title":"Bumblebee Core Architecture Manual. https:\/\/github.com\/nucleisys\/Bumblebee_Core_Doc\/tree\/master. [Online","year":"2024","unstructured":"nucleisys. 2019. Bumblebee Core Architecture Manual. https:\/\/github.com\/nucleisys\/Bumblebee_Core_Doc\/tree\/master. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_66_1","volume-title":"NS100 Single Core Configuration Features. https:\/\/www.nucleisys.com\/product\/ns.php. [Online","year":"2024","unstructured":"nucleisys. 2024. NS100 Single Core Configuration Features. https:\/\/www.nucleisys.com\/product\/ns.php. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_67_1","unstructured":"NVM Express Inc. [n.d.]. NVMe Namespaces. https:\/\/nvmexpress.org\/ resource\/nvme-namespaces\/. [Online; accessed 14-December-2025]."},{"key":"e_1_3_2_1_68_1","unstructured":"NVM Express Inc. 2023. How To Use An Encryption Key Per I\/O. https:\/\/nvmexpress.org\/wp-content\/uploads\/FMS-2023-How-to-use-an-Encryption-Key-per-IO.pdf. [Online; accessed 14-December-2025]."},{"key":"e_1_3_2_1_69_1","unstructured":"NVM Express Inc. 2025. NVM Express Base Specification Revision 2.2. https:\/\/nvmexpress.org\/wp-content\/uploads\/NVM-Express-Base-Specification-Revision-2.2-2025.03.11-Ratified.pdf. [Online; accessed 14-December-2025]."},{"key":"e_1_3_2_1_70_1","volume-title":"OP-TEE Secure storage. https:\/\/optee.readthedocs.io\/en\/latest\/architecture\/secure_storage.html. [Online","author":"OP-TEE.","year":"2024","unstructured":"OP-TEE. 2024. OP-TEE Secure storage. https:\/\/optee.readthedocs.io\/en\/latest\/architecture\/secure_storage.html. [Online; accessed 03-September-2024]"},{"key":"e_1_3_2_1_71_1","volume-title":"a Secret Place Inside the eMMC. https: \/\/sergioprado.blog\/rpmb-a-secret-place-inside-the-emmc\/. [Online","author":"Prado Sergio","year":"2025","unstructured":"Sergio Prado. 2024. RPMB, a Secret Place Inside the eMMC. https: \/\/sergioprado.blog\/rpmb-a-secret-place-inside-the-emmc\/. [Online; accessed 21-April-2025]."},{"key":"e_1_3_2_1_72_1","volume-title":"https:\/\/drive.google.com\/file\/ d\/17GeetSnT5wW3xNuAHI95-SI1gPGd5sJ_\/view. [Online","author":"RISC-V.","year":"2024","unstructured":"RISC-V. 2024. RISCV-Privileged-ISA. https:\/\/drive.google.com\/file\/ d\/17GeetSnT5wW3xNuAHI95-SI1gPGd5sJ_\/view. [Online; accessed 02-September-2024]."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_1_74_1","volume-title":"CoVE v0.7. https:\/\/github.com\/riscv-non-isa\/riscv-ap-tee\/releases. [Online","year":"2024","unstructured":"rsahita. 2024. CoVE v0.7. https:\/\/github.com\/riscv-non-isa\/riscv-ap-tee\/releases. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_75_1","volume-title":"CoVE-IO v0.2.0. https:\/\/github.com\/riscv-non-isa\/riscv-ap-tee-io\/releases. [Online","year":"2024","unstructured":"sameo. 2024. CoVE-IO v0.2.0. https:\/\/github.com\/riscv-non-isa\/riscv-ap-tee-io\/releases. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00013"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508293.1508311"},{"key":"e_1_3_2_1_78_1","volume-title":"https:\/\/www.sifive.com\/boards\/hifive-unleashed. [Online","year":"2024","unstructured":"SiFive. 2024. Hifive-Unleashed. https:\/\/www.sifive.com\/boards\/hifive-unleashed. [Online; accessed 03-September-2024]."},{"key":"e_1_3_2_1_79_1","volume-title":"LMbench context switching benchmark. https:\/\/lmbench.sourceforge.net\/man\/lat_ctx.8.html. [Online","author":"Staelin Carl","year":"2025","unstructured":"Carl Staelin and Larry McVoy. 2025. LMbench context switching benchmark. https:\/\/lmbench.sourceforge.net\/man\/lat_ctx.8.html. [Online; accessed 13-August-2025]."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.11"},{"key":"e_1_3_2_1_81_1","volume-title":"NDSS.","author":"Sun Kun","unstructured":"Kun Sun, Jiang Wang, Fengwei Zhang, and Angelos Stavrou. 2012. SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.. In NDSS. San Diego, CA."},{"key":"e_1_3_2_1_82_1","first-page":"7138","article-title":"Leap: Trustzone based developer-friendly tee for intelligent mobile apps","volume":"22","author":"Sun Lizhi","year":"2022","unstructured":"Lizhi Sun, Shuocheng Wang, Hao Wu, Yuhang Gong, Fengyuan Xu, Yunxin Liu, Hao Han, and Sheng Zhong. 2022. Leap: Trustzone based developer-friendly tee for intelligent mobile apps. IEEE Transactions on Mobile Computing 22, 12 (2022), 7138-7155.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_1_83_1","first-page":"1","article-title":"GANGRENE: Exploring the Mortality of Flash Memory","volume":"12","author":"Templeman Robert","year":"2012","unstructured":"Robert Templeman and Apu Kapadia. 2012. GANGRENE: Exploring the Mortality of Flash Memory. HotSec 12 (2012), 1-1.","journal-title":"HotSec"},{"key":"e_1_3_2_1_84_1","first-page":"00","article-title":"TCG Storage Security Sub-system Class (SSC): Key Per I\/O","volume":"1","author":"Trusted Computing Group","year":"2023","unstructured":"Trusted Computing Group. 2023. TCG Storage Security Sub-system Class (SSC): Key Per I\/O, Version 1.00 (Public Review). https:\/\/trustedcomputinggroup.org\/wp-content\/uploads\/TCG_ Storage_Key_Per_IO_SSC_v1.00_d1.40_05222023.pdf. [Online; accessed 14-December-2025].","journal-title":"Version"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.163"},{"key":"e_1_3_2_1_86_1","first-page":"1221","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. {ERIM}: Secure, efficient in-process isolation with protection keys ({ { { { {MPK} } } } }). In 28th USENIX Security Symposium (USENIX Security 19). 1221-1238."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833604"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23068"},{"key":"e_1_3_2_1_90_1","volume-title":"Pandora's Box in Your SSD: The Untold Dangers of NVMe. arXiv preprint arXiv:2411.00439","author":"Wertenbroek Rick","year":"2024","unstructured":"Rick Wertenbroek and Alberto Dassatti. 2024. Pandora's Box in Your SSD: The Untold Dangers of NVMe. arXiv preprint arXiv:2411.00439 (2024)."},{"key":"e_1_3_2_1_91_1","volume-title":"https:\/\/wiki.xenproject.org\/wiki\/ Paravirtualization_(PV). [Online","year":"2025","unstructured":"Xen. 2015. Paravirtualization_(PV). https:\/\/wiki.xenproject.org\/wiki\/ Paravirtualization_(PV). [Online; accessed 14-January-2025]."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.27"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3678015.3680486"}],"event":{"name":"ASPLOS '26: 31st ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Pittsburgh PA USA","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 31st ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T14:01:20Z","timestamp":1773583280000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3779212.3790242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,22]]},"references-count":93,"alternative-id":["10.1145\/3779212.3790242","10.1145\/3779212"],"URL":"https:\/\/doi.org\/10.1145\/3779212.3790242","relation":{},"subject":[],"published":{"date-parts":[[2026,3,22]]},"assertion":[{"value":"2026-03-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}