{"id":"https://openalex.org/W4400119900","doi":"https://doi.org/10.1145/3634737.3637644","title":"Building Your Own Trusted Execution Environments Using FPGA","display_name":"Building Your Own Trusted Execution Environments Using FPGA","publication_year":2024,"publication_date":"2024-06-28","ids":{"openalex":"https://openalex.org/W4400119900","doi":"https://doi.org/10.1145/3634737.3637644"},"language":"en","primary_location":{"id":"doi:10.1145/3634737.3637644","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3634737.3637644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023241583","display_name":"Md Armanuzzaman","orcid":"https://orcid.org/0009-0004-5264-7962"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Armanuzzaman","raw_affiliation_strings":["Department of Computer Science and Engineering, University at Buffalo, Buffalo, NY, United States of America"],"raw_orcid":"https://orcid.org/0009-0004-5264-7962","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University at Buffalo, Buffalo, NY, United States of America","institution_ids":["https://openalex.org/I63190737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079497016","display_name":"Ahmad\u2010Reza Sadeghi","orcid":"https://orcid.org/0000-0001-6833-3598"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technische Universit\u00e4t Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ahmad-Reza Sadeghi","raw_affiliation_strings":["Department of Computer Science, Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"raw_orcid":"https://orcid.org/0000-0001-6833-3598","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073603754","display_name":"Ziming Zhao","orcid":"https://orcid.org/0000-0002-4930-5556"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ziming Zhao","raw_affiliation_strings":["Department of Computer Science and Engineering, University at Buffalo, Buffalo, NY, United States of America"],"raw_orcid":"https://orcid.org/0000-0002-4930-5556","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University at Buffalo, Buffalo, NY, United States of America","institution_ids":["https://openalex.org/I63190737"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023241583"],"corresponding_institution_ids":["https://openalex.org/I63190737"],"apc_list":null,"apc_paid":null,"fwci":1.3245,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83199013,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1584","last_page":"1599"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.769733190536499},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.7158514857292175},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.5154165029525757},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.5026895999908447},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4616481363773346},{"id":"https://openalex.org/keywords/trusted-platform-module","display_name":"Trusted Platform Module","score":0.4609347879886627},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.37047937512397766},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3239307999610901}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.769733190536499},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.7158514857292175},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.5154165029525757},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.5026895999908447},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4616481363773346},{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.4609347879886627},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.37047937512397766},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3239307999610901}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3634737.3637644","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3634737.3637644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6519422124","display_name":null,"funder_award_id":"2237238","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W70331077","https://openalex.org/W85269535","https://openalex.org/W198928148","https://openalex.org/W1493190345","https://openalex.org/W1990771216","https://openalex.org/W2014517322","https://openalex.org/W2026478719","https://openalex.org/W2094756095","https://openalex.org/W2128159601","https://openalex.org/W2135577965","https://openalex.org/W2152605584","https://openalex.org/W2170961388","https://openalex.org/W2273027740","https://openalex.org/W2294282016","https://openalex.org/W2463516579","https://openalex.org/W2536548552","https://openalex.org/W2579697044","https://openalex.org/W2593994116","https://openalex.org/W2612380866","https://openalex.org/W2741593962","https://openalex.org/W2764252782","https://openalex.org/W2892344663","https://openalex.org/W2904773682","https://openalex.org/W2910327197","https://openalex.org/W2914223029","https://openalex.org/W2988192799","https://openalex.org/W3006305014","https://openalex.org/W3016246341","https://openalex.org/W3018905343","https://openalex.org/W3085910988","https://openalex.org/W3095614308","https://openalex.org/W3148171432","https://openalex.org/W3170528295","https://openalex.org/W3181507516","https://openalex.org/W3213416239","https://openalex.org/W3214245048","https://openalex.org/W4324007153","https://openalex.org/W6634294492","https://openalex.org/W6638906098","https://openalex.org/W6644484760","https://openalex.org/W6659299567","https://openalex.org/W6682119575","https://openalex.org/W6712237015","https://openalex.org/W6743710834","https://openalex.org/W6749989571","https://openalex.org/W6755958147","https://openalex.org/W6763090720","https://openalex.org/W6795422248","https://openalex.org/W6808500461","https://openalex.org/W6843679598","https://openalex.org/W6910550570","https://openalex.org/W6966786533","https://openalex.org/W7072147067"],"related_works":["https://openalex.org/W2355956995","https://openalex.org/W2354645290","https://openalex.org/W2168345601","https://openalex.org/W2390768934","https://openalex.org/W2695299078","https://openalex.org/W2372678089","https://openalex.org/W2365715481","https://openalex.org/W1497930374","https://openalex.org/W2374998183","https://openalex.org/W104943326"],"abstract_inverted_index":{"Despite":[0],"of":[1,16,51],"their":[2],"benefits,":[3],"existing":[4],"Trusted":[5,35],"Execution":[6,80],"Environments":[7],"(TEE)":[8],"or":[9,108],"enclaves":[10],"have":[11,97],"been":[12],"criticized":[13],"for":[14,43],"lack":[15],"transparency,":[17],"vulnerabilities,":[18],"and":[19,32,62,87],"various":[20],"restrictions.":[21],"A":[22],"significant":[23],"limitation":[24],"is":[25],"that":[26,39],"they":[27],"only":[28],"provide":[29],"a":[30,74],"static":[31],"fixed":[33],"hardware":[34,60,117],"Computing":[36],"Base":[37],"(TCB)":[38],"cannot":[40],"be":[41],"customized":[42],"different":[44],"applications.":[45],"The":[46],"design":[47],"violates":[48],"the":[49,59,67,78,116],"principle":[50],"least":[52],"privilege":[53],"by":[54],"including":[55],"unnecessary":[56],"peripherals":[57],"in":[58,66,103,115],"TCB":[61],"buggy":[63],"peripheral":[64],"drivers":[65],"software":[68,101,126],"TCB.":[69],"Additionally,":[70],"Existing":[71],"TEEs":[72,104],"time-share":[73],"processor":[75],"core":[76],"with":[77,125],"Rich":[79],"Environment":[81],"(REE),":[82],"making":[83,120],"execution":[84],"less":[85],"efficient":[86],"vulnerable":[88],"to":[89,123],"cache":[90],"side-channel":[91],"attacks.":[92],"Although":[93],"many":[94],"previous":[95],"projects":[96],"focused":[98],"on":[99,105],"addressing":[100],"issues":[102,112],"SGX,":[106],"TrustZone,":[107],"RISC-V,":[109],"some":[110],"TEE":[111],"are":[113],"inherent":[114],"system's":[118],"design,":[119],"them":[121],"impossible":[122],"resolve":[124],"alone.":[127]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
