{"id":"https://openalex.org/W3216915957","doi":"https://doi.org/10.1109/vlsi-soc53125.2021.9606968","title":"In Hardware We Trust? From TPM to Enclave Computing on RISC-V","display_name":"In Hardware We Trust? From TPM to Enclave Computing on RISC-V","publication_year":2021,"publication_date":"2021-10-04","ids":{"openalex":"https://openalex.org/W3216915957","doi":"https://doi.org/10.1109/vlsi-soc53125.2021.9606968","mag":"3216915957"},"language":"en","primary_location":{"id":"doi:10.1109/vlsi-soc53125.2021.9606968","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vlsi-soc53125.2021.9606968","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020886026","display_name":"Emmanuel Stapf","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Emmanuel Stapf","raw_affiliation_strings":["Technical University of Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064735520","display_name":"Patrick Jauernig","orcid":"https://orcid.org/0000-0002-4002-3691"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Patrick Jauernig","raw_affiliation_strings":["Technical University of Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086225281","display_name":"Ferdinand Brasser","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ferdinand Brasser","raw_affiliation_strings":["Technical University of Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079497016","display_name":"Ahmad\u2010Reza Sadeghi","orcid":"https://orcid.org/0000-0001-6833-3598"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ahmad-Reza Sadeghi","raw_affiliation_strings":["Technical University of Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5020886026"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":null,"apc_paid":null,"fwci":0.136,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57059386,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7447558641433716},{"id":"https://openalex.org/keywords/reduced-instruction-set-computing","display_name":"Reduced instruction set computing","score":0.5846380591392517},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5803381204605103},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.554756224155426},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.501495361328125},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5011780261993408},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4971812069416046},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4072887599468231},{"id":"https://openalex.org/keywords/instruction-set","display_name":"Instruction set","score":0.29903703927993774},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.1458519697189331}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7447558641433716},{"id":"https://openalex.org/C126298526","wikidata":"https://www.wikidata.org/wiki/Q189376","display_name":"Reduced instruction set computing","level":3,"score":0.5846380591392517},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5803381204605103},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.554756224155426},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.501495361328125},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5011780261993408},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4971812069416046},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4072887599468231},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.29903703927993774},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.1458519697189331},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vlsi-soc53125.2021.9606968","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vlsi-soc53125.2021.9606968","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321408","display_name":"Ministry of Education","ror":"https://ror.org/01p262204"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W198928148","https://openalex.org/W1488058190","https://openalex.org/W1607006990","https://openalex.org/W1613874182","https://openalex.org/W1935672779","https://openalex.org/W2004456327","https://openalex.org/W2075095478","https://openalex.org/W2135274013","https://openalex.org/W2150620897","https://openalex.org/W2171482413","https://openalex.org/W2175377689","https://openalex.org/W2187802606","https://openalex.org/W2463516579","https://openalex.org/W2593994116","https://openalex.org/W2795160257","https://openalex.org/W2883797314","https://openalex.org/W2890914193","https://openalex.org/W2899688953","https://openalex.org/W2905380323","https://openalex.org/W2911958393","https://openalex.org/W2914223029","https://openalex.org/W2966638792","https://openalex.org/W2966941365","https://openalex.org/W3016246341","https://openalex.org/W3021475380","https://openalex.org/W3048743148","https://openalex.org/W3103974952","https://openalex.org/W3154972140","https://openalex.org/W4238851087","https://openalex.org/W4243908662","https://openalex.org/W4287627556","https://openalex.org/W6608070349","https://openalex.org/W6629297748","https://openalex.org/W6719314992","https://openalex.org/W6734345789","https://openalex.org/W6753006707","https://openalex.org/W6766700459","https://openalex.org/W6766773006","https://openalex.org/W6784599125"],"related_works":["https://openalex.org/W2059626797","https://openalex.org/W2168345601","https://openalex.org/W2082288922","https://openalex.org/W2354645290","https://openalex.org/W1985479624","https://openalex.org/W2390768934","https://openalex.org/W2012253919","https://openalex.org/W1989709299","https://openalex.org/W2008032393","https://openalex.org/W1993387723"],"abstract_inverted_index":{"System-on-Chip":[0],"platforms":[1],"have":[2],"been":[3],"increasingly":[4],"extended":[5],"with":[6,63],"trusted":[7],"computing":[8],"functionality":[9],"to":[10,52],"provide":[11],"strong":[12],"protection":[13],"for":[14],"sensitive":[15],"software":[16,29],"applications":[17],"through":[18],"enclaves":[19],"that":[20],"only":[21],"require":[22],"trust":[23],"in":[24],"the":[25,32,44,81,94],"hardware":[26],"and":[27,68,102],"minimal":[28],"components.":[30],"However,":[31],"deployed":[33],"enclave":[34,61,96],"architectures":[35,62],"are":[36],"still":[37],"suffering":[38],"from":[39],"various":[40],"shortcomings":[41],"such":[42],"as":[43],"lack":[45],"of":[46,74,93],"secure":[47],"I/O,":[48],"or":[49],"being":[50,78],"vulnerable":[51],"side-channel":[53],"attacks.":[54],"Thus,":[55],"recent":[56],"research":[57],"works":[58],"propose":[59],"new":[60],"more":[64],"comprehensive":[65],"threat":[66],"models":[67],"advanced":[69],"security":[70],"features.":[71],"A":[72],"majority":[73],"these":[75],"solutions":[76],"is":[77],"developed":[79],"on":[80],"open":[82,103],"RISC-V":[83],"architecture.":[84],"In":[85],"this":[86],"paper,":[87],"we":[88],"present":[89],"a":[90],"brief":[91],"overview":[92],"RISC-V-based":[95],"architectures,":[97],"discuss":[98],"their":[99],"features,":[100],"limitations":[101],"challenges.":[104]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
