{"id":"https://openalex.org/W7134956500","doi":"https://doi.org/10.1145/3779212.3790242","title":"Trust-V: Toward Secure and Reliable Storage for Trusted Execution Environments","display_name":"Trust-V: Toward Secure and Reliable Storage for Trusted Execution Environments","publication_year":2026,"publication_date":"2026-03-10","ids":{"openalex":"https://openalex.org/W7134956500","doi":"https://doi.org/10.1145/3779212.3790242"},"language":null,"primary_location":{"id":"doi:10.1145/3779212.3790242","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3779212.3790242","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3779212.3790242","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051536411","display_name":"S. H. Han","orcid":null},"institutions":[{"id":"https://openalex.org/I196345858","display_name":"Chungnam National University","ror":"https://ror.org/0227as991","country_code":"KR","type":"education","lineage":["https://openalex.org/I196345858"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"SeungKyun Han","raw_affiliation_strings":["Chungnam National University, Daejeon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Chungnam National University, Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I196345858"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018143334","display_name":"Jing Yang","orcid":"https://orcid.org/0000-0002-7067-804X"},"institutions":[{"id":"https://openalex.org/I196345858","display_name":"Chungnam National University","ror":"https://ror.org/0227as991","country_code":"KR","type":"education","lineage":["https://openalex.org/I196345858"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jiyeon Yang","raw_affiliation_strings":["Chungnam National University, Daejeon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Chungnam National University, Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I196345858"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5128784555","display_name":"Jinsoo Jang","orcid":null},"institutions":[{"id":"https://openalex.org/I196345858","display_name":"Chungnam National University","ror":"https://ror.org/0227as991","country_code":"KR","type":"education","lineage":["https://openalex.org/I196345858"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jinsoo Jang","raw_affiliation_strings":["Chungnam National University, Daejeon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Chungnam National University, Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I196345858"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051536411"],"corresponding_institution_ids":["https://openalex.org/I196345858"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.93224279,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2125","last_page":"2140"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9387000203132629,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9387000203132629,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.014499999582767487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.009200000204145908,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.7685999870300293},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.6044999957084656},{"id":"https://openalex.org/keywords/trusted-platform-module","display_name":"Trusted Platform Module","score":0.5910000205039978},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.534500002861023},{"id":"https://openalex.org/keywords/trusted-computing-base","display_name":"Trusted computing base","score":0.5343000292778015},{"id":"https://openalex.org/keywords/mandatory-access-control","display_name":"Mandatory access control","score":0.5041000247001648},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.48730000853538513},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4672999978065491},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4507000148296356}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7886999845504761},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.7685999870300293},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.6044999957084656},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6039999723434448},{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.5910000205039978},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.534500002861023},{"id":"https://openalex.org/C147346212","wikidata":"https://www.wikidata.org/wiki/Q5492632","display_name":"Trusted computing base","level":4,"score":0.5343000292778015},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.5041000247001648},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.492000013589859},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.48730000853538513},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4672999978065491},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4507000148296356},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43059998750686646},{"id":"https://openalex.org/C206149592","wikidata":"https://www.wikidata.org/wiki/Q3999882","display_name":"Trusted Network Connect","level":3,"score":0.42879998683929443},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4081999957561493},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.3772999942302704},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.37610000371932983},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3246999979019165},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.32409998774528503},{"id":"https://openalex.org/C19163912","wikidata":"https://www.wikidata.org/wiki/Q7681779","display_name":"Tamper resistance","level":2,"score":0.31209999322891235},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2847999930381775},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.2800999879837036},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.2768999934196472},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.26759999990463257},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2637999951839447},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.25609999895095825},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25600001215934753},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2547999918460846}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3779212.3790242","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3779212.3790242","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3779212.3790242","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3779212.3790242","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.5173826813697815,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1493190345","https://openalex.org/W2057743816","https://openalex.org/W2089448621","https://openalex.org/W2097723548","https://openalex.org/W2128159601","https://openalex.org/W2133592286","https://openalex.org/W2151182669","https://openalex.org/W2167804035","https://openalex.org/W2168872572","https://openalex.org/W2175377689","https://openalex.org/W2471066505","https://openalex.org/W2542538106","https://openalex.org/W2605883969","https://openalex.org/W2946055845","https://openalex.org/W3021475380","https://openalex.org/W3033862860","https://openalex.org/W3036557299","https://openalex.org/W4213345993","https://openalex.org/W4236561850","https://openalex.org/W4308641861","https://openalex.org/W4401994306"],"related_works":[],"abstract_inverted_index":{"Trusted":[0,60,102],"execution":[1,142],"environments":[2],"(TEEs)":[3],"provide":[4],"strong":[5],"isolation":[6,65],"for":[7,67,147],"security-critical":[8],"applications":[9],"(enclaves)":[10],"and":[11,29,84,87,95,171],"their":[12],"runtime":[13,63],"data":[14,28],"from":[15],"potentially":[16],"malicious":[17],"operating":[18],"systems.":[19],"While":[20],"TEEs":[21,68],"also":[22],"support":[23,123],"secure":[24,124],"storage":[25,64,81],"by":[26,51,91],"sealing":[27],"storing":[30],"it":[31,45,164],"persistently":[32],"on":[33,116,126],"media,":[34],"they":[35],"do":[36],"not":[37],"ensure":[38,100],"the":[39,71,117,150],"integrity":[40,72],"of":[41,73],"sealed":[42],"data,":[43],"leaving":[44],"vulnerable":[46],"to":[47,122,160,168],"deletion":[48],"or":[49,108],"manipulation":[50],"an":[52],"untrusted":[53,85],"OS.":[54],"In":[55,120],"this":[56],"work,":[57],"we":[58],"present":[59],"Storage,":[61],"a":[62,113,136,139],"mechanism":[66],"that":[69],"guarantees":[70],"TEE":[74,166],"persistent":[75,173],"data.":[76,174],"The":[77],"core":[78],"design":[79],"partitions":[80],"into":[82],"trusted":[83],"regions":[86,94],"enforces":[88],"access":[89],"control":[90],"locking":[92],"MMIO":[93],"monitoring":[96],"block":[97],"I/O.":[98],"To":[99],"portability,":[101],"Storage":[103],"requires":[104],"no":[105],"hardware":[106],"modifications":[107],"additional":[109],"hardware.":[110],"We":[111],"implemented":[112],"prototype,":[114],"Trust-V,":[115],"RISC-V":[118],"platform.":[119],"particular,":[121],"operation":[125],"legacy":[127],"devices":[128],"where":[129],"security":[130],"features":[131],"are":[132],"limited,":[133],"Trust-V":[134,157],"introduces":[135],"Virtual-M":[137],"mode,":[138,146],"sandboxed":[140],"privileged":[141],"environment":[143],"in":[144],"machine":[145],"securely":[148],"hosting":[149],"monitor.":[151],"Our":[152],"evaluation":[153],"demonstrates":[154],"that,":[155],"although":[156],"incurs":[158],"up":[159],"3.86\u00d7":[161],"system":[162],"overhead,":[163],"allows":[165],"software":[167],"reliably":[169],"store":[170],"retrieve":[172]},"counts_by_year":[],"updated_date":"2026-03-12T06:18:43.230356","created_date":"2026-03-12T00:00:00"}
