{"id":"https://openalex.org/W2045604437","doi":"https://doi.org/10.1145/1457246.1457254","title":"Analysis and design of a hardware/software trusted platform module for embedded systems","display_name":"Analysis and design of a hardware/software trusted platform module for embedded systems","publication_year":2008,"publication_date":"2008-12-01","ids":{"openalex":"https://openalex.org/W2045604437","doi":"https://doi.org/10.1145/1457246.1457254","mag":"2045604437"},"language":"en","primary_location":{"id":"doi:10.1145/1457246.1457254","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1457246.1457254","pdf_url":null,"source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088935034","display_name":"Najwa Aaraj","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Najwa Aaraj","raw_affiliation_strings":["Princeton University, Princeton, NJ"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065766721","display_name":"Anand Raghunathan","orcid":"https://orcid.org/0000-0002-4624-564X"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anand Raghunathan","raw_affiliation_strings":["Purdue University, West Lafayette, IN"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086131079","display_name":"Niraj K. Jha","orcid":"https://orcid.org/0000-0002-1539-0369"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Niraj K. Jha","raw_affiliation_strings":["Princeton University, Princeton, NJ"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088935034"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":4.5764,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.94344955,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"8","issue":"1","first_page":"1","last_page":"31"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8590505123138428},{"id":"https://openalex.org/keywords/trusted-platform-module","display_name":"Trusted Platform Module","score":0.858493447303772},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.7437102198600769},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.7220131754875183},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.6038177609443665},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5836458206176758},{"id":"https://openalex.org/keywords/arm-architecture","display_name":"ARM architecture","score":0.5096821784973145},{"id":"https://openalex.org/keywords/embedded-operating-system","display_name":"Embedded operating system","score":0.4790288507938385},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46449875831604004},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.42129814624786377}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8590505123138428},{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.858493447303772},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.7437102198600769},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.7220131754875183},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.6038177609443665},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5836458206176758},{"id":"https://openalex.org/C26771161","wikidata":"https://www.wikidata.org/wiki/Q16980","display_name":"ARM architecture","level":2,"score":0.5096821784973145},{"id":"https://openalex.org/C35939892","wikidata":"https://www.wikidata.org/wiki/Q1139923","display_name":"Embedded operating system","level":3,"score":0.4790288507938385},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46449875831604004},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.42129814624786377},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1457246.1457254","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1457246.1457254","pdf_url":null,"source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G11056573","display_name":null,"funder_award_id":"CCR-0326372CNS-0720110","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G378320842","display_name":null,"funder_award_id":"CCR-0326372CNS-0720110","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W111934558","https://openalex.org/W1481815984","https://openalex.org/W1482030462","https://openalex.org/W1493210595","https://openalex.org/W1501707359","https://openalex.org/W1522228241","https://openalex.org/W1558389509","https://openalex.org/W1578321116","https://openalex.org/W1860992226","https://openalex.org/W1906603983","https://openalex.org/W2091478576","https://openalex.org/W2096333427","https://openalex.org/W2115175416","https://openalex.org/W2120562931","https://openalex.org/W2120653360","https://openalex.org/W2154730255","https://openalex.org/W2159283580","https://openalex.org/W2166004296","https://openalex.org/W4206796831"],"related_works":["https://openalex.org/W2387334916","https://openalex.org/W3046653481","https://openalex.org/W2499097732","https://openalex.org/W4233593324","https://openalex.org/W2097016043","https://openalex.org/W2364215762","https://openalex.org/W2391522383","https://openalex.org/W2375248064","https://openalex.org/W2045604437","https://openalex.org/W2771025373"],"abstract_inverted_index":{"Trusted":[0,31,185],"platforms":[1],"have":[2,70],"been":[3],"proposed":[4,271],"as":[5,175],"a":[6,29,44,56,108,112,176,217,222,242,274],"promising":[7],"approach":[8],"to":[9,42,81,147,162,249,292],"enhance":[10],"the":[11,23,61,84,101,120,134,148,158,168,179,184,195,199,202,212,229,270],"security":[12],"of":[13,28,100,150,170,197,204,211,244,257,268,290],"general-purpose":[14],"computing":[15],"systems.":[16],"However,":[17,65],"for":[18,89,107,140,178,294],"many":[19,67],"resource-constrained":[20],"embedded":[21,62,68,276],"systems,":[22],"size":[24],"and":[25,74,86,103,123,221,246,255,283],"cost":[26],"overheads":[27,106,143,196],"separate":[30],"Platform":[32],"Module":[33],"(TPM)":[34],"chip":[35],"are":[36,75,91,144,155],"not":[37],"acceptable.":[38,92],"One":[39],"alternative":[40],"is":[41,78],"use":[43,149,169],"software-based":[45],"TPM,":[46],"which":[47],"implements":[48],"TPM":[49,128,296],"functions":[50],"using":[51,198,237],"software":[52,247],"that":[53,83,139,154],"executes":[54],"in":[55,183,201,233,261],"protected":[57],"execution":[58,104,121],"domain":[59],"on":[60,111,133,273],"processor":[63,277],"itself.":[64],"since":[66],"systems":[69],"limited":[71],"processing":[72,259],"capabilities":[73,260],"battery-powered,":[76],"it":[77],"also":[79,193],"important":[80],"ensure":[82],"computational":[85,230],"energy":[87,102,124],"requirements":[88],"SW-TPMs":[90],"In":[93,160,190],"this":[94],"article,":[95],"we":[96,166,192,227,286],"perform":[97],"an":[98],"evaluation":[99],"time":[105,122],"SW-TPM":[109,164,200,235],"implementation":[110],"handheld":[113],"appliance":[114],"(Sharp":[115],"Zaurus":[116],"PDA).":[117],"We":[118,137,239,265],"characterize":[119],"required":[125],"by":[126],"each":[127],"command":[129],"through":[130],"actual":[131],"measurements":[132],"target":[135],"platform.":[136],"observe":[138],"most":[141],"commands,":[142],"primarily":[145],"due":[146],"2,048-bit":[151],"RSA":[152,180],"operations":[153],"performed":[156],"within":[157],"SW-TPM.":[159],"order":[161],"alleviate":[163],"overheads,":[165],"evaluate":[167,194],"Elliptic":[171],"Curve":[172],"Cryptography":[173],"(ECC)":[174],"replacement":[177],"algorithm":[181],"specified":[182],"Computing":[186],"Group":[187],"(TCG)":[188],"standards.":[189],"addition,":[191],"context":[203],"various":[205],"end":[206],"applications,":[207],"including":[208],"trusted":[209],"boot":[210],"Linux":[213],"operating":[214],"system":[215],"(OS),":[216],"secure":[218,223],"VoIP":[219],"client,":[220],"Web":[224],"browser.":[225],"Furthermore,":[226],"analyze":[228],"workload":[231],"involved":[232],"running":[234],"commands":[236],"ECC.":[238],"then":[240],"present":[241],"suite":[243],"hardware":[245],"enhancements":[248],"accelerate":[250],"these":[251],"commands\u2014generic":[252],"custom":[253],"instructions":[254],"exploitation":[256],"parallel":[258],"multiprocessor":[262,284],"systems-on-chip":[263],"(SoCs).":[264],"report":[266],"results":[267],"evaluating":[269],"architectures":[272],"commercial":[275],"(Xtensa":[278],"from":[279],"Tensilica).":[280],"Through":[281],"uniprocessor":[282],"optimizations,":[285],"could":[287],"achieve":[288],"speed-ups":[289],"up":[291],"5.71X":[293],"individual":[295],"commands.":[297]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
