{"id":"https://openalex.org/W4400121580","doi":"https://doi.org/10.1145/3634737.3645002","title":"On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers","display_name":"On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers","publication_year":2024,"publication_date":"2024-06-28","ids":{"openalex":"https://openalex.org/W4400121580","doi":"https://doi.org/10.1145/3634737.3645002"},"language":"en","primary_location":{"id":"doi:10.1145/3634737.3645002","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3634737.3645002","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047579400","display_name":"Zhiang Li","orcid":"https://orcid.org/0009-0007-8051-5141"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Zhiang Li","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049285151","display_name":"Daisuke Mashima","orcid":"https://orcid.org/0000-0003-1946-1790"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daisuke Mashima","raw_affiliation_strings":["Illinois Advanced Research Center at Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Illinois Advanced Research Center at Singapore, Singapore, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087160267","display_name":"Wen Shei Ong","orcid":"https://orcid.org/0009-0000-4411-0226"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wen Shei Ong","raw_affiliation_strings":["Illinois Advanced Research Center at Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Illinois Advanced Research Center at Singapore, Singapore, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023606873","display_name":"Ertem Esiner","orcid":"https://orcid.org/0000-0002-3290-2514"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ertem Esiner","raw_affiliation_strings":["Illinois Advanced Research Center at Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Illinois Advanced Research Center at Singapore, Singapore, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043860236","display_name":"Zbigniew Kalbarczyk","orcid":"https://orcid.org/0009-0002-6040-6865"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zbigniew Kalbarczyk","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, Champaign, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, Champaign, United States of America","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105408906","display_name":"Ee\u2010Chien Chang","orcid":"https://orcid.org/0000-0003-4613-0866"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ee-Chien Chang","raw_affiliation_strings":["School of Computing, National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing, National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5047579400"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":1.4504,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.84183421,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"947","last_page":"961"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7566094994544983},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.540355920791626},{"id":"https://openalex.org/keywords/arm-architecture","display_name":"ARM architecture","score":0.4541577100753784},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3502475321292877}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7566094994544983},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.540355920791626},{"id":"https://openalex.org/C26771161","wikidata":"https://www.wikidata.org/wiki/Q16980","display_name":"ARM architecture","level":2,"score":0.4541577100753784},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3502475321292877}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3634737.3645002","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3634737.3645002","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320709","display_name":"National Research Foundation Singapore","ror":"https://ror.org/03cpyc314"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2039427951","https://openalex.org/W2397986719","https://openalex.org/W2407991977","https://openalex.org/W2561791320","https://openalex.org/W2613412685","https://openalex.org/W2701138980","https://openalex.org/W2771494169","https://openalex.org/W2775534077","https://openalex.org/W2913096406","https://openalex.org/W2958285686","https://openalex.org/W2991063899","https://openalex.org/W3017341171","https://openalex.org/W3205502046","https://openalex.org/W4200426685","https://openalex.org/W4200550162","https://openalex.org/W4206342209","https://openalex.org/W4226133732","https://openalex.org/W4236786653","https://openalex.org/W4238860551","https://openalex.org/W4243196937","https://openalex.org/W4245540091","https://openalex.org/W4249935030","https://openalex.org/W4283219743","https://openalex.org/W4288057753","https://openalex.org/W4383370901"],"related_works":["https://openalex.org/W2016486756","https://openalex.org/W2370330671","https://openalex.org/W2912613323","https://openalex.org/W2375870986","https://openalex.org/W2937681102","https://openalex.org/W2044727965","https://openalex.org/W2157201356","https://openalex.org/W2392910191","https://openalex.org/W1700025863","https://openalex.org/W2399091034"],"abstract_inverted_index":{"Programmable":[0],"logic":[1,61,95],"controllers":[2],"(PLCs)":[3],"are":[4,34,42],"crucial":[5],"devices":[6,101,142],"for":[7,70,140,158,223,236],"implementing":[8],"automated":[9],"control":[10,14,60],"in":[11,102,143,199,211],"various":[12],"industrial":[13],"systems":[15],"(ICS),":[16],"such":[17,133,186],"as":[18,187],"smart":[19],"power":[20],"grids,":[21],"water":[22],"treatment":[23],"systems,":[24],"manufacturing,":[25],"and":[26,111,171,181,189,196,203,220,239],"transportation":[27],"systems.":[28],"Owing":[29],"to":[30,121,167,234],"their":[31],"importance,":[32],"PLCs":[33,176],"often":[35],"the":[36,46,51,57,84,103,144,150,153,160,169,174,178,194,206,212],"target":[37],"of":[38,48,59,67,152,162,173],"cyber":[39],"attackers":[40],"that":[41,132],"aiming":[43],"at":[44],"disrupting":[45],"operation":[47],"ICS,":[49],"including":[50,105],"nation's":[52],"critical":[53],"infrastructure,":[54],"by":[55],"compromising":[56],"integrity":[58],"execution.":[62],"While":[63],"a":[64,81,114,123,134,217],"wide":[65],"range":[66],"cybersecurity":[68],"solutions":[69],"ICS":[71,100,141,201,219,227],"have":[72],"been":[73],"proposed,":[74],"they":[75],"cannot":[76],"counter":[77],"strong":[78],"adversaries":[79],"with":[80],"foothold":[82],"on":[83,108,128,205,226],"PLC":[85,94],"devices,":[86],"which":[87],"could":[88],"manipulate":[89],"memory,":[90],"I/O":[91],"interface,":[92],"or":[93],"itself.":[96],"These":[97],"days,":[98],"many":[99],"market,":[104],"PLCs,":[106],"run":[107],"ARM-based":[109],"processors,":[110],"there":[112],"is":[113,166,231],"promising":[115],"security":[116,136,161],"technology":[117,157],"called":[118],"ARM":[119,154],"TrustZone,":[120],"offer":[122],"Trusted":[124],"Execution":[125],"Environment":[126],"(TEE)":[127],"embedded":[129],"devices.":[130,228],"Envisioning":[131],"hardware-assisted":[135],"feature":[137],"becomes":[138],"available":[139,233],"near":[145],"future,":[146],"this":[147],"paper":[148],"investigates":[149],"application":[151,225],"TrustZone":[155],"TEE":[156],"enhancing":[159],"PLC.":[163],"Our":[164,191,229],"aim":[165],"evaluate":[168],"feasibility":[170],"practicality":[172],"TEE-based":[175],"through":[177],"proof-of-concept":[179],"design":[180],"implementation":[182,230],"using":[183],"open-source":[184],"software":[185],"OP-TEE":[188,213],"OpenPLC.":[190],"evaluation":[192],"assesses":[193],"performance":[195],"resource":[197],"consumption":[198],"real-world":[200],"configurations,":[202],"based":[204],"results,":[207],"we":[208],"discuss":[209],"bottlenecks":[210],"secure":[214],"OS":[215],"towards":[216],"large-scale":[218],"desired":[221],"changes":[222],"its":[224],"made":[232],"public":[235],"further":[237],"study":[238],"research.":[240]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
