{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:15:54Z","timestamp":1765484154434},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.23919\/date.2019.8715182","type":"proceedings-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T21:29:07Z","timestamp":1558042147000},"page":"1142-1147","source":"Crossref","is-referenced-by-count":5,"title":["Sanctorum: A lightweight security monitor for secure enclaves"],"prefix":"10.23919","author":[{"given":"Ilia","family":"Lebedev","sequence":"first","affiliation":[]},{"given":"Kyle","family":"Hogan","sequence":"additional","affiliation":[]},{"given":"Jules","family":"Drean","sequence":"additional","affiliation":[]},{"given":"David","family":"Kohlbrenner","sequence":"additional","affiliation":[]},{"given":"Dayeol","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Krste","family":"Asanovic","sequence":"additional","affiliation":[]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[]},{"given":"Srinivas","family":"Devadas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"tiny_sha3","year":"2018","author":"saarinen","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134098"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"journal-title":"The RISC-V Instruction Set Manual Volume II Privileged Architecture","year":"2017","author":"waterman","key":"ref13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132782"},{"key":"ref3","first-page":"857","article-title":"Sanctum: Minimal hardware extensions for strong software isolation","author":"costan","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"journal-title":"Keystone Open-source secure hardware enclave","year":"2018","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref7","first-page":"46","article-title":"Secure Boot and Remote Attestation in the Sanctum Processor","author":"lebedev","year":"2018","journal-title":"31st IEEE Computer Security Foundations Symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2010.5416657"},{"key":"ref1","first-page":"9","article-title":"Towards proving security in the presence of large untrusted components","author":"andronick","year":"2010","journal-title":"Proceedings of the 5th International Conference on Systems Software Verification"},{"key":"ref9","article-title":"Design and implementation of the ascend secure processor","author":"ren","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"}],"event":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2019,3,25]]},"location":"Florence, Italy","end":{"date-parts":[[2019,3,29]]}},"container-title":["2019 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8704855\/8714721\/08715182.pdf?arnumber=8715182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T23:49:44Z","timestamp":1559605784000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8715182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":13,"URL":"https:\/\/doi.org\/10.23919\/date.2019.8715182","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}