{"id":"https://openalex.org/W2941049640","doi":"https://doi.org/10.1109/isqed.2019.8697657","title":"Lightweight Secure-Boot Architecture for RISC-V System-on-Chip","display_name":"Lightweight Secure-Boot Architecture for RISC-V System-on-Chip","publication_year":2019,"publication_date":"2019-03-01","ids":{"openalex":"https://openalex.org/W2941049640","doi":"https://doi.org/10.1109/isqed.2019.8697657","mag":"2941049640"},"language":"en","primary_location":{"id":"doi:10.1109/isqed.2019.8697657","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed.2019.8697657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"20th International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://dr.ntu.edu.sg/bitstream/10356/143198/2/Lightweight%20Secure-Boot%20Architecture%20for%20RISC-V%20System-on-Chip.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019739002","display_name":"Jawad Haj-Yahya","orcid":"https://orcid.org/0000-0003-2911-0329"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Jawad Haj-Yahya","raw_affiliation_strings":["Nanyang Technological University (NTU), Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University (NTU), Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021584648","display_name":"Ming Ming Wong","orcid":"https://orcid.org/0000-0002-6420-1202"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ming Ming Wong","raw_affiliation_strings":["Nanyang Technological University (NTU), Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University (NTU), Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025451495","display_name":"Vikramkumar Pudi","orcid":"https://orcid.org/0000-0003-3992-0624"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Vikramkumar Pudi","raw_affiliation_strings":["Nanyang Technological University (NTU), Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University (NTU), Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081720773","display_name":"Shivam Bhasin","orcid":"https://orcid.org/0000-0002-6903-5127"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Shivam Bhasin","raw_affiliation_strings":["Nanyang Technological University (NTU), Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University (NTU), Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089860351","display_name":"Anupam Chattopadhyay","orcid":"https://orcid.org/0000-0002-8818-6983"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Anupam Chattopadhyay","raw_affiliation_strings":["Nanyang Technological University (NTU), Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University (NTU), Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5019739002"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":5.1668,"has_fulltext":true,"cited_by_count":39,"citation_normalized_percentile":{"value":0.96188169,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"216","last_page":"223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.974399983882904,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7725468873977661},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6003867387771606},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.5231755375862122},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.503532350063324},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.46551111340522766},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.43786951899528503},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.43771013617515564},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.422895610332489},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.4208712875843048},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3612300753593445},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3513323664665222},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3352911174297333},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.3118356466293335},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.21169805526733398}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7725468873977661},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6003867387771606},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.5231755375862122},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.503532350063324},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.46551111340522766},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.43786951899528503},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.43771013617515564},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.422895610332489},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.4208712875843048},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3612300753593445},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3513323664665222},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3352911174297333},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.3118356466293335},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.21169805526733398},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isqed.2019.8697657","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed.2019.8697657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"20th International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/143198","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/143198","pdf_url":"https://dr.ntu.edu.sg/bitstream/10356/143198/2/Lightweight%20Secure-Boot%20Architecture%20for%20RISC-V%20System-on-Chip.pdf","source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Paper"}],"best_oa_location":{"id":"pmh:oai:dr.ntu.edu.sg:10356/143198","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/143198","pdf_url":"https://dr.ntu.edu.sg/bitstream/10356/143198/2/Lightweight%20Secure-Boot%20Architecture%20for%20RISC-V%20System-on-Chip.pdf","source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Paper"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2941049640.pdf","grobid_xml":"https://content.openalex.org/works/W2941049640.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W17390021","https://openalex.org/W18598421","https://openalex.org/W124068862","https://openalex.org/W194263807","https://openalex.org/W220440441","https://openalex.org/W1512096485","https://openalex.org/W1594155875","https://openalex.org/W1754939103","https://openalex.org/W1965648925","https://openalex.org/W1995871244","https://openalex.org/W2021469490","https://openalex.org/W2024874287","https://openalex.org/W2078726412","https://openalex.org/W2108834246","https://openalex.org/W2111015674","https://openalex.org/W2116374153","https://openalex.org/W2130351941","https://openalex.org/W2134585683","https://openalex.org/W2148330234","https://openalex.org/W2156420172","https://openalex.org/W2157549033","https://openalex.org/W2186104740","https://openalex.org/W2605953901","https://openalex.org/W2668120530","https://openalex.org/W2751658612","https://openalex.org/W2775257084","https://openalex.org/W2789836338","https://openalex.org/W2798732646","https://openalex.org/W2800696620","https://openalex.org/W2804138125","https://openalex.org/W2884219450","https://openalex.org/W2887233729","https://openalex.org/W2951325898","https://openalex.org/W2963311060","https://openalex.org/W4248175462","https://openalex.org/W6676995458","https://openalex.org/W6743926752"],"related_works":["https://openalex.org/W3201596224","https://openalex.org/W1565266559","https://openalex.org/W1990743860","https://openalex.org/W2782833818","https://openalex.org/W4226182343","https://openalex.org/W3191743943","https://openalex.org/W4303856864","https://openalex.org/W2260005205","https://openalex.org/W3213981908","https://openalex.org/W4319302742"],"abstract_inverted_index":{"Securing":[0],"thousands":[1],"of":[2,30,35,97,139,162],"connected,":[3],"resource-constrained":[4],"computing":[5,66],"devices":[6],"is":[7,41,169],"a":[8,86],"major":[9],"challenge":[10],"nowadays.":[11],"Adding":[12],"to":[13,23,70,135],"the":[14,24,28,31,36,48,118,136,140,154,167],"challenge,":[15],"third":[16],"party":[17],"service":[18],"providers":[19],"need":[20],"regular":[21],"access":[22],"system.":[25],"To":[26],"ensure":[27],"integrity":[29],"system":[32],"and":[33,77,111,149,164],"authenticity":[34],"software":[37],"vendor,":[38],"secure":[39,65,89,147],"boot":[40,90,148],"supported":[42],"by":[43,58],"several":[44],"commercial":[45],"processors.":[46],"However,":[47],"existing":[49],"solutions":[50],"are":[51,68],"either":[52],"complex,":[53],"or":[54],"have":[55],"been":[56],"compromised":[57],"determined":[59],"attackers.":[60,80],"In":[61,81,116],"this":[62,82],"scenario,":[63],"open-source":[64],"architectures":[67],"poised":[69],"play":[71],"an":[72,126],"important":[73],"role":[74],"for":[75,132,166],"designers":[76],"white":[78],"hat":[79],"manuscript,":[83],"we":[84],"propose":[85],"lightweight":[87],"hardware-based":[88],"architecture.":[91],"The":[92],"architecture":[93,119],"uses":[94],"efficient":[95],"implementation":[96],"Elliptic":[98],"Curve":[99],"Digital":[100],"Signature":[101],"Algorithm":[102,106],"(ECDSA),":[103],"Secure":[104],"Hash":[105],"3":[107],"(SHA3)":[108],"hashing":[109],"algorithm":[110],"Direct":[112],"Memory":[113],"Access":[114],"(DMA).":[115],"addition,":[117],"includes":[120],"Key":[121],"Management":[122],"Unit,":[123],"which":[124],"incorporates":[125],"optimized":[127],"Physical":[128],"Unclonable":[129],"Function":[130],"(PUF)":[131],"providing":[133],"keys":[134],"security":[137,165],"blocks":[138],"System":[141],"on":[142,156],"Chip":[143],"(SoC),":[144],"among":[145],"which,":[146],"remote":[150],"attestation.":[151],"We":[152],"demonstrated":[153],"framework":[155],"RISC-V":[157],"based":[158],"SoC.":[159],"Detailed":[160],"analysis":[161],"performance":[163],"platform":[168],"presented.":[170]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":2}],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-10-10T00:00:00"}
