{"id":"https://openalex.org/W7139109985","doi":"https://doi.org/10.48550/arxiv.2603.17757","title":"On Securing the Software Development Lifecycle in IoT RISC-V Trusted Execution Environments","display_name":"On Securing the Software Development Lifecycle in IoT RISC-V Trusted Execution Environments","publication_year":2026,"publication_date":"2026-03-18","ids":{"openalex":"https://openalex.org/W7139109985","doi":"https://doi.org/10.48550/arxiv.2603.17757"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.17757","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.17757","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.17757","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129945087","display_name":"Annika Wilde","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wilde, Annika","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062082119","display_name":"Samira Briongos","orcid":"https://orcid.org/0000-0001-7671-0242"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Briongos, Samira","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044190947","display_name":"Claudio Soriente","orcid":"https://orcid.org/0000-0002-8215-5457"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Soriente, Claudio","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5059087800","display_name":"Ghassan Karame","orcid":"https://orcid.org/0000-0002-2828-4071"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Karame, Ghassan","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5129945087"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.5013999938964844,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.5013999938964844,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.3330000042915344,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.03150000050663948,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/automotive-industry","display_name":"Automotive industry","score":0.5260000228881836},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.5177000164985657},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.49799999594688416},{"id":"https://openalex.org/keywords/downtime","display_name":"Downtime","score":0.4884999990463257},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.45739999413490295},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.43470001220703125},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.41940000653266907},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.38100001215934753},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.3580999970436096}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6866999864578247},{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.5260000228881836},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5177000164985657},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.49799999594688416},{"id":"https://openalex.org/C180591934","wikidata":"https://www.wikidata.org/wiki/Q1253369","display_name":"Downtime","level":2,"score":0.4884999990463257},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4832000136375427},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.45739999413490295},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.43470001220703125},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.41940000653266907},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.38100001215934753},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3580999970436096},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.3483000099658966},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.33250001072883606},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.32190001010894775},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3154999911785126},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.3138999938964844},{"id":"https://openalex.org/C174683762","wikidata":"https://www.wikidata.org/wiki/Q609588","display_name":"Component-based software engineering","level":4,"score":0.3125},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.2874999940395355},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2874000072479248},{"id":"https://openalex.org/C20574231","wikidata":"https://www.wikidata.org/wiki/Q844605","display_name":"Backward compatibility","level":2,"score":0.2867000102996826},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.2849000096321106},{"id":"https://openalex.org/C14185376","wikidata":"https://www.wikidata.org/wiki/Q30232","display_name":"Agile software development","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.27559998631477356},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.272599995136261},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.27090001106262207},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.27000001072883606},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.26739999651908875},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.26190000772476196},{"id":"https://openalex.org/C105446022","wikidata":"https://www.wikidata.org/wiki/Q445962","display_name":"Legacy system","level":3,"score":0.2531000077724457},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.2526000142097473}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.17757","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.17757","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.17757","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.17757","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6577144861221313}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"RISC-V-based":[0],"Trusted":[1],"Execution":[2],"Environments":[3],"(TEEs)":[4],"are":[5,47,97],"gaining":[6],"traction":[7],"in":[8,102],"the":[9,22,51,76,103,108,113,141,192],"automotive":[10,104,198],"and":[11,37,87,94,134,173,197],"IoT":[12,196],"sectors":[13],"as":[14,177,179],"a":[15,64,185],"foundation":[16],"for":[17,33,41,100,181],"protecting":[18],"sensitive":[19],"computations.":[20],"However,":[21],"supporting":[23],"infrastructure":[24],"around":[25],"these":[26],"TEEs":[27,70,119],"remains":[28,176],"immature.":[29],"In":[30,55],"particular,":[31],"mechanisms":[32],"secure":[34,127,130],"enclave":[35,43,128,174],"updates":[36],"migrations":[38],"-":[39,46,112,120],"essential":[40],"complete":[42],"lifecycle":[44],"management":[45],"largely":[48],"absent":[49],"from":[50],"evolving":[52],"RISC-V":[53,69,89,118],"ecosystem.":[54],"this":[56,60],"paper,":[57],"we":[58],"address":[59],"limitation":[61],"by":[62],"introducing":[63],"novel":[65],"toolkit":[66,81,142],"that":[67,125,140,157],"enables":[68],"to":[71,148],"support":[72],"critical":[73],"aspects":[74],"of":[75,117,194],"software":[77],"development":[78],"lifecycle.":[79],"Our":[80,137,153],"provides":[82],"broad":[83],"compatibility":[84],"with":[85,121,184,191],"existing":[86],"emerging":[88],"TEE":[90],"implementations":[91],"(e.g.,":[92],"Keystone":[93],"CURE),":[95],"which":[96,189],"particularly":[98],"promising":[99],"integration":[101],"industry.":[105],"It":[106],"extends":[107],"Security":[109],"Monitor":[110],"(SM)":[111],"trusted":[114,135],"firmware":[115],"layer":[116],"three":[122],"modular":[123],"extensions":[124],"enable":[126],"update,":[129],"migration,":[131],"state":[132,165],"continuity,":[133],"time.":[136],"implementation":[138],"demonstrates":[139],"requires":[143],"only":[144],"minimal":[145],"interface":[146],"adaptation":[147],"accommodate":[149],"TEE-specific":[150],"naming":[151],"conventions.":[152],"evaluation":[154],"results":[155],"confirm":[156],"our":[158,164],"proposal":[159],"introduces":[160],"negligible":[161],"performance":[162],"overhead:":[163],"continuity":[166],"solution":[167],"incurs":[168],"less":[169],"than":[170],"1.5%":[171],"overhead,":[172],"downtime":[175],"low":[178],"0.8%":[180],"realistic":[182],"applications":[183],"1":[186],"KB":[187],"state,":[188],"conforms":[190],"requirements":[193],"most":[195],"applications.":[199]},"counts_by_year":[],"updated_date":"2026-05-04T08:30:34.212998","created_date":"2026-03-20T00:00:00"}
