{"id":"https://openalex.org/W3138140875","doi":"https://doi.org/10.1016/j.hcc.2021.100009","title":"Design high-confidence computers using trusted instructional set architecture and emulators","display_name":"Design high-confidence computers using trusted instructional set architecture and emulators","publication_year":2021,"publication_date":"2021-03-23","ids":{"openalex":"https://openalex.org/W3138140875","doi":"https://doi.org/10.1016/j.hcc.2021.100009","mag":"3138140875"},"language":"en","primary_location":{"id":"doi:10.1016/j.hcc.2021.100009","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.hcc.2021.100009","pdf_url":null,"source":{"id":"https://openalex.org/S4210186527","display_name":"High-Confidence Computing","issn_l":"2667-2952","issn":["2667-2952"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"High-Confidence Computing","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.hcc.2021.100009","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034056469","display_name":"Shuangbao Wang","orcid":"https://orcid.org/0000-0002-3418-8035"},"institutions":[{"id":"https://openalex.org/I83909951","display_name":"Morgan State University","ror":"https://ror.org/017d8gk22","country_code":"US","type":"education","lineage":["https://openalex.org/I83909951"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shuangbao (Paul) Wang","raw_affiliation_strings":["Department of Computer Science, Morgan State University, Baltimore, MD, United States"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Morgan State University, Baltimore, MD, United States","institution_ids":["https://openalex.org/I83909951"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5034056469"],"corresponding_institution_ids":["https://openalex.org/I83909951"],"apc_list":{"value":1500,"currency":"USD","value_usd":1500},"apc_paid":{"value":1500,"currency":"USD","value_usd":1500},"fwci":0.9384,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.71091582,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"1","issue":"2","first_page":"100009","last_page":"100009"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9739000201225281,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.8361731767654419},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8078246712684631},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.6709260940551758},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.6508411765098572},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6451382040977478},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5525752902030945},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5170012712478638},{"id":"https://openalex.org/keywords/instruction-set","display_name":"Instruction set","score":0.5138335824012756},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.4941466152667999},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.47934040427207947},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.4749082326889038},{"id":"https://openalex.org/keywords/trusted-network-connect","display_name":"Trusted Network Connect","score":0.45099449157714844},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4441632926464081},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4258754849433899},{"id":"https://openalex.org/keywords/trusted-computing-base","display_name":"Trusted computing base","score":0.41381925344467163},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3291684687137604},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3263058066368103},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.20146042108535767},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.09852316975593567},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08706739544868469}],"concepts":[{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.8361731767654419},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8078246712684631},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.6709260940551758},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.6508411765098572},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6451382040977478},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5525752902030945},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5170012712478638},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.5138335824012756},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.4941466152667999},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.47934040427207947},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.4749082326889038},{"id":"https://openalex.org/C206149592","wikidata":"https://www.wikidata.org/wiki/Q3999882","display_name":"Trusted Network Connect","level":3,"score":0.45099449157714844},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4441632926464081},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4258754849433899},{"id":"https://openalex.org/C147346212","wikidata":"https://www.wikidata.org/wiki/Q5492632","display_name":"Trusted computing base","level":4,"score":0.41381925344467163},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3291684687137604},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3263058066368103},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.20146042108535767},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.09852316975593567},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08706739544868469},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1016/j.hcc.2021.100009","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.hcc.2021.100009","pdf_url":null,"source":{"id":"https://openalex.org/S4210186527","display_name":"High-Confidence Computing","issn_l":"2667-2952","issn":["2667-2952"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"High-Confidence Computing","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2506.18780","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2506.18780","pdf_url":"https://arxiv.org/pdf/2506.18780","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:doaj.org/article:31debb32ec274fb38aee32fe0fd077ef","is_oa":true,"landing_page_url":"https://doaj.org/article/31debb32ec274fb38aee32fe0fd077ef","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"High-Confidence Computing, Vol 1, Iss 2, Pp 100009- (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1016/j.hcc.2021.100009","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.hcc.2021.100009","pdf_url":null,"source":{"id":"https://openalex.org/S4210186527","display_name":"High-Confidence Computing","issn_l":"2667-2952","issn":["2667-2952"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"High-Confidence Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4099999964237213}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W94780997","https://openalex.org/W1427174644","https://openalex.org/W1969660388","https://openalex.org/W2083499174","https://openalex.org/W2117489143","https://openalex.org/W2126160338","https://openalex.org/W2163200031","https://openalex.org/W2789901355","https://openalex.org/W2883613460","https://openalex.org/W2963311060","https://openalex.org/W2972319298","https://openalex.org/W2977452293","https://openalex.org/W3083146223","https://openalex.org/W4230984477","https://openalex.org/W4241721260","https://openalex.org/W4244457258","https://openalex.org/W6603811259","https://openalex.org/W6628261430","https://openalex.org/W6671562458","https://openalex.org/W6747544890","https://openalex.org/W6748749902","https://openalex.org/W6753443810","https://openalex.org/W6768688160","https://openalex.org/W6782767024"],"related_works":["https://openalex.org/W2358352283","https://openalex.org/W2356797718","https://openalex.org/W2382159354","https://openalex.org/W143066512","https://openalex.org/W2116177289","https://openalex.org/W2381474365","https://openalex.org/W2350048275","https://openalex.org/W2051856262","https://openalex.org/W2377235694","https://openalex.org/W2387129584"],"abstract_inverted_index":{"High-confidence":[0],"computing":[1,15],"relies":[2],"on":[3,17],"trusted":[4,18,78],"instructional":[5],"set":[6],"architecture,":[7],"sealed":[8],"kernels,":[9],"and":[10,25,37,49,82],"secure":[11],"operating":[12],"systems.":[13],"Cloud":[14],"depends":[16],"systems":[19],"for":[20],"virtualization":[21],"tasks.":[22],"Branch":[23],"predictions":[24],"pipelines":[26],"are":[27],"essential":[28],"in":[29,77],"improving":[30],"performance":[31],"of":[32],"a":[33,54,74],"CPU/GPU.":[34],"But":[35],"Spectre":[36],"Meltdown":[38],"make":[39],"modern":[40],"processors":[41],"vulnerable":[42],"to":[43],"be":[44],"exploited.":[45],"Disabling":[46],"the":[47,58],"prediction":[48],"pipeline":[50],"is":[51],"definitely":[52],"not":[53],"good":[55],"solution.":[56],"On":[57],"other":[59],"hand,":[60],"current":[61],"software":[62],"patches":[63],"can":[64],"only":[65],"address":[66],"non-essential":[67],"issues":[68],"around":[69],"Meltdown.":[70],"This":[71],"paper":[72],"introduces":[73],"holistic":[75],"approach":[76],"computer":[79],"architecture":[80],"design":[81],"emulation.":[83]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
