{"id":"https://openalex.org/W4367359528","doi":"https://doi.org/10.1109/tcad.2023.3271583","title":"ProMiSE: A High-Performance Programmable Hardware Monitor for High Security Enforcement of Software Execution","display_name":"ProMiSE: A High-Performance Programmable Hardware Monitor for High Security Enforcement of Software Execution","publication_year":2023,"publication_date":"2023-04-28","ids":{"openalex":"https://openalex.org/W4367359528","doi":"https://doi.org/10.1109/tcad.2023.3271583"},"language":"en","primary_location":{"id":"doi:10.1109/tcad.2023.3271583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2023.3271583","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004447853","display_name":"Xinrui Wang","orcid":"https://orcid.org/0000-0003-0718-1556"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinrui Wang","raw_affiliation_strings":["School of Electronic Science and Engineering, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056805627","display_name":"Lang Feng","orcid":"https://orcid.org/0000-0001-9943-0550"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lang Feng","raw_affiliation_strings":["School of Electronic Science and Engineering, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100696999","display_name":"Zhongfeng Wang","orcid":"https://orcid.org/0000-0002-7227-4786"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongfeng Wang","raw_affiliation_strings":["School of Electronic Science and Engineering, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004447853"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":0.6983,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74315761,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"42","issue":"11","first_page":"3599","last_page":"3612"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6988738179206848},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.671841561794281},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5546563267707825},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5528275966644287},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5371644496917725},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.46956777572631836},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.42833101749420166},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4182942509651184},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.41052940487861633},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.395752489566803},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3099842965602875},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2067263424396515},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.14751091599464417},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.11419475078582764}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6988738179206848},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.671841561794281},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5546563267707825},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5528275966644287},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5371644496917725},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.46956777572631836},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.42833101749420166},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4182942509651184},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.41052940487861633},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.395752489566803},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3099842965602875},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2067263424396515},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.14751091599464417},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.11419475078582764},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcad.2023.3271583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2023.3271583","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G558768867","display_name":null,"funder_award_id":"JSSCBS20210003","funder_id":"https://openalex.org/F4320331107","funder_display_name":"Shuangchuang Program of Jiangsu Province"},{"id":"https://openalex.org/G7225354281","display_name":null,"funder_award_id":"62204111","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320331107","display_name":"Shuangchuang Program of Jiangsu Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1904738922","https://openalex.org/W1969338270","https://openalex.org/W1969501726","https://openalex.org/W2004211666","https://openalex.org/W2020208333","https://openalex.org/W2081768685","https://openalex.org/W2109219878","https://openalex.org/W2129482816","https://openalex.org/W2157116240","https://openalex.org/W2162800072","https://openalex.org/W2295234910","https://openalex.org/W2297774820","https://openalex.org/W2461431977","https://openalex.org/W2517176850","https://openalex.org/W2752985907","https://openalex.org/W2891216228","https://openalex.org/W2894958393","https://openalex.org/W2963311060","https://openalex.org/W3022734414","https://openalex.org/W3043044582","https://openalex.org/W3091525875","https://openalex.org/W4205313988","https://openalex.org/W6671147960","https://openalex.org/W6744121465","https://openalex.org/W6776945642"],"related_works":["https://openalex.org/W2111241003","https://openalex.org/W4200391368","https://openalex.org/W2210979487","https://openalex.org/W2074043759","https://openalex.org/W3042736233","https://openalex.org/W2082487009","https://openalex.org/W2113594494","https://openalex.org/W4288754584","https://openalex.org/W2461758544","https://openalex.org/W4379115652"],"abstract_inverted_index":{"In":[0],"recent":[1,71],"years,":[2],"to":[3,31,45,54,61,142],"prevent":[4],"computer":[5],"systems":[6],"from":[7,183],"software":[8,25],"attacks,":[9],"hardware":[10,37,75,125,155,162,193],"monitors":[11,66,194],"are":[12,86],"proposed":[13],"as":[14,173,175],"a":[15,46,99,144],"type":[16],"of":[17,35,81,147,195],"efficient":[18,123],"security":[19,80,152],"enforcement":[20],"scheme,":[21],"which":[22,185],"can":[23,41,139],"detect":[24],"attacks":[26],"at":[27],"runtime.":[28],"However,":[29],"due":[30],"the":[32,77,82,92,119,134,170,191],"limited":[33],"flexibility":[34,93],"dedicated":[36,192],"monitors,":[38,76],"one":[39],"monitor":[40,100,126],"be":[42,140],"only":[43],"applied":[44],"few":[47],"targeted":[48],"application":[49],"scenarios,":[50],"and":[51,79,94,103,153],"is":[52,129,186],"hard":[53],"defend":[55],"against":[56],"unconsidered":[57],"attacks.":[58],"This":[59],"leads":[60],"high":[62],"cost":[63],"for":[64,67,107],"redesigning":[65],"new":[68],"scenarios.":[69],"Although":[70],"studies":[72],"propose":[73],"flexible":[74,161],"scope":[78],"reconfigurable":[83],"monitoring":[84,148],"policies":[85,149],"still":[87,168],"limited.":[88],"To":[89],"further":[90],"improve":[91],"security,":[95],"this":[96],"work":[97],"proposes":[98],"instruction":[101],"set":[102],"multiple":[104],"security-assisting":[105],"designs":[106],"supporting":[108],"general":[109],"operations":[110],"needed":[111],"by":[112],"various":[113],"attack":[114],"detection":[115,171],"schemes.":[116],"Based":[117],"on":[118,133],"above":[120],"efforts,":[121],"an":[122],"programmable":[124],"named":[127],"ProMiSE":[128,138,167],"designed.":[130],"After":[131],"implemented":[132],"RocketChip":[135],"RISC-V":[136],"processor,":[137],"programmed":[141],"realize":[143],"wider":[145],"range":[146],"with":[150,159,190],"higher":[151],"similar":[154],"resource":[156],"overhead,":[157],"compared":[158,189],"stateof-the-art":[160],"monitors.":[163],"With":[164],"these":[165],"advantages,":[166],"has":[169],"latency":[172],"low":[174],"18-59":[176],"CPU":[177],"cycles.":[178],"The":[179],"performance":[180],"overhead":[181],"ranges":[182],"0%-23.4%,":[184],"also":[187],"reasonable":[188],"corresponding":[196],"policies.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
