{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T02:08:23Z","timestamp":1771726103037,"version":"3.50.1"},"reference-count":193,"publisher":"Association for Computing Machinery (ACM)","issue":"12","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2024,12,31]]},"abstract":"<jats:p>Hardware has been constantly augmented for security considerations since the advent of computers. There is also a common perception among computer users that hardware does a relatively better job on security assurance compared with software. Yet, the community has long lacked a comprehensive study to answer questions such as how hardware security support contributes to security, what kind of improvements have been introduced to improve such support and what its advantages\/disadvantages are.<\/jats:p>\n          <jats:p>By generalizing various security goals, we taxonomize hardware security features and their security properties that can aid in securing program execution, considered as three aspects, i.e., state correctness, runtime protection and input\/output protection. Based on this taxonomy, the survey systematically examines (1) the roles: how hardware is applied to achieve security; and (2) the problems: how reported attacks have exploited certain defects in hardware. We see that hardware\u2019s unique advantages and problems co-exist and it highly depends on the desired security purpose as to which type to use. Among the survey findings are also that code as part of hardware (aka. firmware) should be treated differently to ensure security by design; and how research proposals have driven the advancement of commodity hardware features.<\/jats:p>","DOI":"10.1145\/3672392","type":"journal-article","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T11:11:49Z","timestamp":1718190709000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A Survey of Hardware Improvements to Secure Program Execution"],"prefix":"10.1145","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6376-4062","authenticated-orcid":false,"given":"Lianying","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Computer Science, Carleton University, Ottawa, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0637-7947","authenticated-orcid":false,"given":"He","family":"Shuang","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Toronto, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5189-7610","authenticated-orcid":false,"given":"Shengjie","family":"Xu","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Toronto, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1231-1394","authenticated-orcid":false,"given":"Wei","family":"Huang","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Toronto, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9282-2531","authenticated-orcid":false,"given":"Rongzhen","family":"Cui","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Toronto, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1123-7662","authenticated-orcid":false,"given":"Pushkar","family":"Bettadpur","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Toronto, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2000-6827","authenticated-orcid":false,"given":"David","family":"Lie","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Toronto, Toronto, Canada"}]}],"member":"320","published-online":{"date-parts":[[2024,10]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1535\/itj.1003.02"},{"key":"e_1_3_2_5_2","first-page":"1060","article-title":"Port contention for fun and profit.","volume":"2018","author":"Aldaya Alejandro Cabrera","year":"2018","unstructured":"Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida Garc\u00eda, and Nicola Tuveri. 2018. Port contention for fun and profit. IACR Cryptology ePrint Archive 2018 (2018), 1060.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_6_2","unstructured":"Alibaba Group. 2022. ECS Bare Metal Instance. Retrieved from https:\/\/www.alibabacloud.com\/product\/ebm [Accessed May 8 2024]."},{"key":"e_1_3_2_7_2","volume-title":"AMD64 Architecture Programmer\u2019s Manual Volume 2: System Programming","year":"2018","unstructured":"AMD. 2018. AMD64 Architecture Programmer\u2019s Manual Volume 2: System Programming."},{"key":"e_1_3_2_8_2","volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy","volume":"13","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, Vol. 13."},{"key":"e_1_3_2_9_2","unstructured":"Anonymous. 2004. Opteron Exposed: Reverse Engineering AMD K8 Microcode Updates. Retrieved from https:\/\/web.archive.org\/web\/20191103220248\/. https:\/\/securiteam.com\/securityreviews\/5FP0M1PDFO\/ [Accessed May 8 2024]."},{"key":"e_1_3_2_10_2","unstructured":"Anonymous. 2009. Numerous System Management Mode (SMM) privilege escalation vulnerabilities in ASUS motherboards including Eee PC series. Retrieved from https:\/\/dl.packetstormsecurity.net\/0908-advisories\/smm-escalate.txt [Accessed May 8 2024]."},{"key":"e_1_3_2_11_2","volume-title":"ARM Architecture Reference Manual: ARMv8, for ARMv8-A architecture profile","year":"2021","unstructured":"ARM. 2021. ARM Architecture Reference Manual: ARMv8, for ARMv8-A architecture profile."},{"key":"e_1_3_2_12_2","unstructured":"ARM. 2022. Arm Morello Program. Retrieved from https:\/\/www.arm.com\/architecture\/cpu\/morello [Accessed May 8 2024]."},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007795"},{"key":"e_1_3_2_14_2","volume-title":"Proceedings of the 2014 ACM Conference on Computer and Communications Security","author":"Azab Ahmed M.","year":"2014","unstructured":"Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, and Wenbo Shen. 2014. Hypervision across worlds: Real-time kernel protection from the ARM TrustZone secure world. In Proceedings of the 2014 ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046752"},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Ying Bai. 2016. ARM\u00ae Memory Protection Unit (MPU).","DOI":"10.1201\/9781315367101-12"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3103002"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_19_2","volume-title":"The 15th Annual CanSecWest Conference","author":"Bazhaniuk Oleksandr","year":"2015","unstructured":"Oleksandr Bazhaniuk, Yuriy Bulygin, Andrew Furtak, Mikhail Gorobets, John Loucaides, Alexander Matrosov, and Mickey Shkatov. 2015. A new class of vulnerabilities in SMI handlers. In The 15th Annual CanSecWest Conference."},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Atri Bhattacharyya Alexandra Sandulescu Matthias Neugschwandtner Alessandro Sorniotti Babak Falsafi Mathias Payer and Anil Kurmus. 2019. SMoTherSpectre: Exploiting speculative execution through port contention. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201919).","DOI":"10.1145\/3319535.3363194"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"issue":"5","key":"e_1_3_2_22_2","first-page":"2:1\u20132:11","article-title":"Secure your cloud workloads with IBM secure execution for linux on IBM z15 and LinuxONE III","volume":"64","author":"Borntr\u00e4ger C.","year":"2020","unstructured":"C. Borntr\u00e4ger, J. D. Bradbury, R. B\u00fcndgen, F. Busaba, L. C. Heller, and V. Mihajlovski. 2020. Secure your cloud workloads with IBM secure execution for linux on IBM z15 and LinuxONE III. IBM Journal of Research and Development 64, 5\/6 (2020), 2:1\u20132:11.","journal-title":"IBM Journal of Research and Development"},{"key":"e_1_3_2_23_2","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT\u201917)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure: SGX cache attacks are practical. In 11th USENIX Workshop on Offensive Technologies (WOOT\u201917)."},{"key":"e_1_3_2_24_2","unstructured":"BSDaemon coideloko and D0nand0n. 2008. System Management Mode Hacks: Using SMM for \u2018Other Purposes\u2019. Retrieved from http:\/\/phrack.org\/issues\/65\/7.html [Accessed May 8 2024]."},{"key":"e_1_3_2_25_2","volume-title":"ACM SIGSAC Conference on Computer and Communications Security (CCS \u201919)","author":"Buhren Robert","year":"2019","unstructured":"Robert Buhren, Christian Werling, and Jean-Pierre Seifert. 2019. Insecure until proven updated: Analyzing AMD SEV\u2019s remote attestation. In ACM SIGSAC Conference on Computer and Communications Security (CCS \u201919)."},{"key":"e_1_3_2_26_2","volume-title":"USENIX Security Symposium","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In USENIX Security Symposium."},{"key":"e_1_3_2_27_2","volume-title":"Defcon","author":"Bulygin Yuriy","year":"2014","unstructured":"Yuriy Bulygin, John Loucaides, Andrew Furtak, Oleksandr Bazhaniuk, and Alexander Matrosov. 2014. Summary of attacks against BIOS and secure boot. In Defcon. Retrieved from DOI:http:\/\/www.c7zero.info\/stuff\/DEFCON22-BIOSAttacks.pdf[Accessed May 8, 2024]."},{"key":"e_1_3_2_28_2","volume-title":"BlackHat Briefings USA","author":"Bulygin Yuriy","year":"2008","unstructured":"Yuriy Bulygin and David Samyde. 2008. Chipset based approach to detect virtualization malware. In BlackHat Briefings USA. Retrieved from DOI:http:\/\/me.bios.io\/images\/2\/23\/DeepWatch.pdf[Accessed May 8, 2024]."},{"issue":"1","key":"e_1_3_2_29_2","first-page":"16","article-title":"Control-flow integrity: Precision, security, and performance","volume":"50","author":"Burow Nathan","year":"2017","unstructured":"Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, and Mathias Payer. 2017. Control-flow integrity: Precision, security, and performance. ACM Computing Surveys (CSUR) 50, 1 (2017), 16.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_30_2","volume-title":"Proceedings of the 2019 IEEE Symposium on Security and Privacy","author":"Burow Nathan","year":"2019","unstructured":"Nathan Burow, Xinping Zhang, and Mathias Payer. 2019. SoK: Shining light on shadow stacks. In Proceedings of the 2019 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_31_2","volume-title":"Proceedings of the 2013 ACM Conference on Computer & Communications Security","author":"Butterworth John","year":"2013","unstructured":"John Butterworth, Corey Kallenberg, Xeno Kovah, and Amy Herzog. 2013. Bios chronomancy: Fixing the core root of trust for measurement. In Proceedings of the 2013 ACM Conference on Computer & Communications Security."},{"key":"e_1_3_2_32_2","doi-asserted-by":"crossref","unstructured":"G. Cabodi P. Camurati C. Loiacono G. Pipitone F. Savarese and D. Vendraminetto. 2015. Formal verification of embedded systems for remote attestation. WSEAS Transactions on Computers 14 (2015) 760\u2013769.","DOI":"10.1109\/DAAS.2016.7492565"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2490301.2451145"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446736"},{"key":"e_1_3_2_35_2","volume-title":"IEEE European Symposium on Security and Privacy","author":"Chen Guoxing","year":"2019","unstructured":"Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H. Lai. 2019. SGXpectre: Stealing intel secrets from sgx enclaves via speculative execution. In IEEE European Symposium on Security and Privacy."},{"key":"e_1_3_2_36_2","volume-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS \u201917)","author":"Chen Sanchuan","year":"2017","unstructured":"Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, and Yinqian Zhang. 2017. Detecting privileged side-channel attacks in shielded execution with D\u00e9J\u00e0 Vu. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS \u201917)."},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSC.2001.918971"},{"key":"e_1_3_2_38_2","unstructured":"Citrix. 2015. Foundational Security with Intel TXT and Citrix XenServer. Retrieved from https:\/\/stg-xyz.sky.citrix.com\/content\/dam\/citrix\/en_us\/documents\/partner-documents\/foundational-security-with-intel-txt-and-citrix-xenserver.pdf [Accessed Feb 26 2024]."},{"key":"e_1_3_2_39_2","doi-asserted-by":"crossref","unstructured":"David Cooper William Polk Andrew Regenscheid and Murugiah Souppaya. 2011. BIOS protection guidelines. Natl. Inst. Stand. Technol. Spec. Publ. 800-147 (2011) 27 pages.","DOI":"10.6028\/NIST.SP.800-147"},{"key":"e_1_3_2_40_2","volume-title":"Intel SGX Explained.","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained.Technical Report. Cryptology ePrint Archive."},{"key":"e_1_3_2_41_2","volume-title":"Proceedings of the 25th USENIX Conference on Security Symposium (SEC\u201916)","author":"Costan Victor","year":"2016","unstructured":"Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal hardware extensions for strong software isolation. In Proceedings of the 25th USENIX Conference on Security Symposium (SEC\u201916)."},{"key":"e_1_3_2_42_2","volume-title":"USENIX security symposium","author":"Cowan Crispan","year":"1998","unstructured":"Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, and Heather Hinton. 1998. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX security symposium, Vol. 98."},{"key":"e_1_3_2_43_2","volume-title":"Hardware and Architectural Support for Security and Privacy (HASP\u201920)","author":"Dangwal Deeksha","year":"2020","unstructured":"Deeksha Dangwal, Meghan Cowan, Armin Alaghi, Vincent T. Lee, Brandon Reagen, and Caronline Trippel. 2020. SoK: Opportunities for software-hardware-security codesign for next generation secure computing. In Hardware and Architectural Support for Security and Privacy (HASP\u201920). Article 8, 9 pages."},{"key":"e_1_3_2_44_2","unstructured":"Ruan de Clercq and Ingrid Verbauwhede. 2017. A survey of hardware-based control flow integrity (CFI). arXiv:1706.07257. Retrieved from https:\/\/arxiv.org\/abs\/1706.07257"},{"key":"e_1_3_2_45_2","volume-title":"Proceedings of the International Conference on Computer-Aided Design, ICCAD 2018, San Diego, CA, USA, November 05-08, 2018","author":"Dessouky Ghada","year":"2018","unstructured":"Ghada Dessouky, Tigist Abera, Ahmad Ibrahim, and Ahmad-Reza Sadeghi. 2018. LiteHAX: Lightweight hardware-assisted attestation of program execution. In Proceedings of the International Conference on Computer-Aided Design, ICCAD 2018, San Diego, CA, USA, November 05-08, 2018, Iris Bahar (Ed.)."},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346295"},{"key":"e_1_3_2_47_2","volume-title":"Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS\u201915)","author":"Dhawan Udit","year":"2015","unstructured":"Udit Dhawan, Catalin Hritcu, Raphael Rubin, Nikos Vasilakis, Silviu Chiricescu, Jonathan M. Smith, Thomas F. Knight, Jr., Benjamin C. Pierce, and Andre DeHon. 2015. Architectural support for software-defined metadata processing. In Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS\u201915)."},{"key":"e_1_3_2_48_2","unstructured":"Martin G. Dixon David A. Koufaty Camron B. Rust Hermann W. Gartler and Frank Binns. 2014. Steering system management code region accesses. US Patent 8 683 158. Filed in 2005."},{"key":"e_1_3_2_49_2","volume-title":"CanSecWest","author":"Duflot Lo\u0131c","year":"2006","unstructured":"Lo\u0131c Duflot, Daniel Etiemble, and Olivier Grumelard. 2006. Using CPU system management mode to circumvent operating system security functions. In CanSecWest. Retrieved from DOI:https:\/\/www.ssi.gouv.fr\/en\/publication\/using-cpu-system-management-mode-to-circumvent-operating-system-security-functions\/"},{"key":"e_1_3_2_50_2","volume-title":"CanSecWest","author":"Duflot Lo\u00efc","year":"2009","unstructured":"Lo\u00efc Duflot, Olivier Levillain, Benjamin Morin, and Olivier Grumelard. 2009. Getting into the SMRAM: SMM reloaded. In CanSecWest. Retrieved from DOI:https:\/\/www.ssi.gouv.fr\/uploads\/IMG\/pdf\/Cansec_final.pdf"},{"key":"e_1_3_2_51_2","article-title":"System Management Mode Design and Security Issues","author":"Duflot Lo\u0131c","year":"2010","unstructured":"Lo\u0131c Duflot, Olivier Levillain, Benjamin Morin, and Olivier Grumelard. 2010. System Management Mode Design and Security Issues. IT Defense. Retrieved from DOI:https:\/\/cyber.gouv.fr\/sites\/default\/files\/IMG\/pdf\/IT_Defense_2010_final.pdf[Accessed May 8, 2024].","journal-title":"IT Defense"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_20"},{"key":"e_1_3_2_53_2","volume-title":"BlackHat","author":"Eichner Alexander","year":"2020","unstructured":"Alexander Eichner and Robert Buhren. 2020. All you ever wanted to know about the AMD Platform Security Processor and were afraid to emulate. In BlackHat."},{"issue":"12","key":"e_1_3_2_54_2","doi-asserted-by":"crossref","first-page":"1590","DOI":"10.1002\/sec.166","article-title":"SMM rootkit: A new breed of OS independent malware","volume":"6","author":"Embleton Shawn","year":"2010","unstructured":"Shawn Embleton, Sherri Sparks, and Cliff C. Zou. 2010. SMM rootkit: A new breed of OS independent malware. Security and Communication Networks 6, 12 (2010), 1590\u20131605.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_55_2","unstructured":"Alexander Ermolov. 2016. Safeguarding Rootkits: Intel Boot Guard. Zeronights. Retrieved from https:\/\/papers.put.as\/papers\/firmware\/2016\/Intel_BootGuard_final.pdf [Accessed May 8 2024]."},{"key":"e_1_3_2_56_2","unstructured":"Mark Ermolov and Maxim Goryachy. 2017. How to Hack a Turned-off Computer or Running Unsigned Code in Intel Management Engine. Blackhat Europe 2017."},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.25"},{"key":"e_1_3_2_58_2","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"farkhani Reza Mirzazade","year":"2021","unstructured":"Reza Mirzazade farkhani, Mansour Ahmadi, and Long Lu. 2021. PTAuth: Temporal memory safety via robust points-to authentication. In 30th USENIX Security Symposium (USENIX Security 21)."},{"key":"e_1_3_2_59_2","volume-title":"Proceedings of the 2011 IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2011, Hong Kong, China, June 27-30 2011","author":"Filyanov Atanas","year":"2011","unstructured":"Atanas Filyanov, Jonathan M. McCune, Ahmad-Reza Sadeghi, and Marcel Winandy. 2011. Uni-directional trusted path: Transaction confirmation on just one device. In Proceedings of the 2011 IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2011, Hong Kong, China, June 27-30 2011."},{"key":"e_1_3_2_60_2","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Frassetto Tommaso","year":"2018","unstructured":"Tommaso Frassetto, Patrick Jauernig, Christopher Liebchen, and Ahmad-Reza Sadeghi. 2018. IMIX:In-process memory Isolation eXtension. In 27th USENIX Security Symposium (USENIX Security 18)."},{"key":"e_1_3_2_61_2","volume-title":"22nd International Conference on Architectural Support for Programming Languages and Operating Systems","author":"Ge Xinyang","year":"2017","unstructured":"Xinyang Ge, Weidong Cui, and Trent Jaeger. 2017. GRIFFIN: Guarding control flows using intel processor trace. In 22nd International Conference on Architectural Support for Programming Languages and Operating Systems."},{"key":"e_1_3_2_62_2","unstructured":"Xinyang Ge Hayawardh Vijayakumar and Trent Jaeger. 2014. Sprobes: Enforcing kernel code integrity on the TrustZone architecture. arXiv:1410.7747. Retrieved from https:\/\/arxiv.org\/abs\/1410.7747"},{"key":"e_1_3_2_63_2","unstructured":"Sergiu D Ghetie. 2010. Protecting system management mode (SMM) spaces against cache attacks. US Patent 7 698 507. Filed in 2007."},{"key":"e_1_3_2_64_2","unstructured":"Google Cloud. 2022. Confidential Computing concepts. Retrieved from https:\/\/cloud.google.com\/compute\/confidential-vm\/docs\/about-cvm [Accessed May 8 2024]."},{"key":"e_1_3_2_65_2","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Gras Ben","year":"2018","unstructured":"Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2018. Translation leak-aside buffer: Defeating cache side-channel protections with TLB attacks. In 27th USENIX Security Symposium (USENIX Security 18)."},{"key":"e_1_3_2_66_2","volume-title":"26th USENIX Security Symposium","author":"Green Marc","year":"2017","unstructured":"Marc Green, Leandro Rodrigues-Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, and Thomas Eisenbarth. 2017. AutoLock: Why cache attacks on ARM are harder than you think. In 26th USENIX Security Symposium."},{"key":"e_1_3_2_67_2","volume-title":"TCG Glossary","author":"Group Trusted Computing","year":"2017","unstructured":"Trusted Computing Group. 2017. TCG Glossary."},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.8"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"e_1_3_2_71_2","doi-asserted-by":"crossref","unstructured":"John Heasman. 2006. Implementing and Detecting a PCI Rootkit.","DOI":"10.1016\/S1353-4858(06)70326-9"},{"key":"e_1_3_2_72_2","volume-title":"BlackHat Federal","author":"Heasman John","year":"2006","unstructured":"John Heasman. 2006. Implementing and detecting an ACPI BIOS rootkit. In BlackHat Federal."},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133600"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243797"},{"key":"e_1_3_2_75_2","volume-title":"Proceedings of the 3rd Workshop on System Software for Trusted Execution (SysTEX 2018)","author":"Huang Wei","year":"2018","unstructured":"Wei Huang, Vasily Rudchenko, He Shuang, Zhen Huang, and David Lie. 2018. Pearl-TEE: Supporting untrusted applications in TrustZone. In Proceedings of the 3rd Workshop on System Software for Trusted Execution (SysTEX 2018)."},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447786.3456243"},{"key":"e_1_3_2_77_2","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)","author":"Ibdah Duha","year":"2020","unstructured":"Duha Ibdah, Nada Lachtar, Abdulrahman Abu Elkhail, Anys Bacha, and Hafiz Malik. 2020. Dark Firmware: A systematic approach to exploring application security risks in the presence of untrusted firmware. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)."},{"key":"e_1_3_2_78_2","volume-title":"Intel Xeon Processor E3-1200v4 Product Family Datasheet\u2014Volume 2 of 2","year":"2015","unstructured":"Intel. 2015. Intel Xeon Processor E3-1200v4 Product Family Datasheet\u2014Volume 2 of 2."},{"key":"e_1_3_2_79_2","unstructured":"Intel. 2015. SMI Transfer Monitor (STM). Retrieved from https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/tool\/smi-transfer-monitor-stm.html [Accessed May 8 2024]."},{"key":"e_1_3_2_80_2","volume-title":"Intel Software Guard Extensions Developer Guide","year":"2017","unstructured":"Intel. 2017. Intel Software Guard Extensions Developer Guide."},{"key":"e_1_3_2_81_2","volume-title":"Intel Trusted Execution Technology: Software Development Guide","year":"2017","unstructured":"Intel. 2017. Intel Trusted Execution Technology: Software Development Guide."},{"key":"e_1_3_2_82_2","volume-title":"Intel 64 and IA-32 Architectures Software Developer\u2019s Manual","year":"2018","unstructured":"Intel. 2018. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual."},{"key":"e_1_3_2_83_2","volume-title":"Control-flow enforcement technology preview","year":"2019","unstructured":"Intel. 2019. Control-flow enforcement technology preview."},{"key":"e_1_3_2_84_2","unstructured":"Intel. 2020. Intel Xeon E3-1200 v3 Processor Family Specification Update. Retrieved from DOI:https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/specification-updates\/xeon-e3-1200v3-spec-update.pdf"},{"key":"e_1_3_2_85_2","unstructured":"Intel. 2021. Product brief: Hardware-enhanced threat detection. Retrieved from https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/product-briefs\/tdt-product-brief.pdf [Accessed May 8 2024]."},{"key":"e_1_3_2_86_2","unstructured":"Intel. 2021. XuCode: An Innovative Technology for Implementing Complex Instruction Flows. Retrieved from DOI:https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/software-security-guidance\/secure-coding\/xucode-implementing-complex-instruction-flows.html[Accessed May 8 2024]."},{"key":"e_1_3_2_87_2","unstructured":"Intel and VMware. 2013. Embrace Cloud Computing with Intel and VMware Security Solutions. Retrieved from https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/solution-briefs\/intel-vmware-security-solution-brief.pdf [Accessed Feb 26 2024]."},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2947124"},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.112"},{"key":"e_1_3_2_90_2","volume-title":"Hot Chips: A Symposium on High Performance Chips","author":"Johnson Scott","year":"2018","unstructured":"Scott Johnson, Dominic Rizzo, Parthasarathy Ranganathan, Jon McCune, and Richard Ho. 2018. Titan: Enabling a transparent silicon root of trust for cloud. In Hot Chips: A Symposium on High Performance Chips, Vol. 194."},{"key":"e_1_3_2_91_2","volume-title":"Defeating Signed BIOS Enforcement","author":"Kallenberg Corey","year":"2014","unstructured":"Corey Kallenberg, John Butterworth, Xeno Kovah, and C. Cornwell. 2014. Defeating Signed BIOS Enforcement. Technical Report. The MITRE Corporation. Retrieved from DOI:https:\/\/apps.dtic.mil\/sti\/citations\/trecms\/AD1107701"},{"key":"e_1_3_2_92_2","volume-title":"The Symposium on Security for Asia Network (SyScan)(April 2014)","author":"Kallenberg Corey","year":"2014","unstructured":"Corey Kallenberg, Sam Cornwell, Xeno Kovah, and John Butterworth. 2014. Setup for failure: Defeating secure boot. In The Symposium on Security for Asia Network (SyScan)(April 2014)."},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.38"},{"key":"e_1_3_2_94_2","doi-asserted-by":"crossref","unstructured":"Paul Kocher Daniel Genkin Daniel Gruss Werner Haas Mike Hamburg Moritz Lipp Stefan Mangard Thomas Prescher Michael Schwarz and Yuval Yarom. 2018. Spectre Attacks: Exploiting Speculative Execution. Communications of the ACM 63 7 (2020).","DOI":"10.1145\/3399742"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243861"},{"key":"e_1_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241280"},{"key":"e_1_3_2_98_2","unstructured":"Xeno Kovah John Butterworth Corey Kallenberg and Sam Cornwell. 2014. Copernicus 2: SENTER the Dragon."},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516713"},{"key":"e_1_3_2_100_2","unstructured":"Michael Larabel. 2018. Intel MPX Support Removed From GCC 9. Retrieved from DOI:https:\/\/www.phoronix.com\/scan.php?page=news_item&px=MPX-Removed-From-GCC9[Accessed May 8 2024]."},{"key":"e_1_3_2_101_2","article-title":"Department of Defense Trusted Computer System Evaluation Criteria","author":"Latham Donald C.","year":"1986","unstructured":"Donald C. Latham. 1986. Department of Defense Trusted Computer System Evaluation Criteria. Department of Defense.","journal-title":"Department of Defense"},{"key":"e_1_3_2_102_2","volume-title":"Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 13)","author":"Lee Hojoon","year":"2013","unstructured":"Hojoon Lee, HyunGon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek, and Brent ByungHoon Kang. 2013. KI-Mon: A hardware-assisted event-triggered monitoring platform for mutable kernel object. In Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 13)."},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241233"},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210334"},{"key":"e_1_3_2_105_2","unstructured":"Xupeng Li Xuheng Li Christoffer Dall Ronghui Gu Jason Nieh Yousuf Sait Gareth Stockwell Mark Knight and Charles Garcia-Tobin. 2023. Enabling Realms with the Arm Confidential Compute Architecture."},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1145\/356989.357005"},{"key":"e_1_3_2_107_2","volume-title":"30th USENIX Security Symposium","author":"Liljestrand Hans","year":"2021","unstructured":"Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, and N. Asokan. 2021. PACStack: An authenticated call stack. In 30th USENIX Security Symposium."},{"key":"e_1_3_2_108_2","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security\u201918)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading kernel memory from user space. In Proceedings of the 27th USENIX Security Symposium (USENIX Security\u201918)."},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0025-y"},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2647955"},{"key":"e_1_3_2_111_2","volume-title":"26th USENIX Security Symposium","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback protection for trusted execution. In 26th USENIX Security Symposium."},{"key":"e_1_3_2_112_2","volume-title":"EuroSys\u201908","author":"McCune Jonathan M.","year":"2008","unstructured":"Jonathan M. McCune, Bryan J. Parno, Adrian Perrig, Michael K. Reiter, and Hiroshi Isozaki. 2008. Flicker: An execution infrastructure for TCB minimization. In EuroSys\u201908."},{"key":"e_1_3_2_113_2","volume-title":"Proceedings of the Network and Distributed System Security Symposium, 2009","author":"McCune Jonathan M.","year":"2009","unstructured":"Jonathan M. McCune, Adrian Perrig, and Michael K. Reiter. 2009. Safe passage for passwords and other sensitive data. In Proceedings of the Network and Distributed System Security Symposium, 2009."},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00088"},{"key":"e_1_3_2_115_2","unstructured":"Microsoft.com. 2022. Azure Confidential Computing. Retrieved from https:\/\/azure.microsoft.com\/en-us\/solutions\/confidential-compute [Accessed May 8 2024]."},{"key":"e_1_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/3214292.3214301"},{"key":"e_1_3_2_117_2","volume-title":"32nd USENIX Security Symposium","author":"Moghimi Daniel","year":"2023","unstructured":"Daniel Moghimi. 2023. Downfall: Exploiting speculative data gathering. In 32nd USENIX Security Symposium."},{"key":"e_1_3_2_118_2","volume-title":"ACM Conference on Computer and Communications Security","author":"Moon Hyungon","year":"2012","unstructured":"Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim, Yunheung Paek, and Brent Byunghoon Kang. 2012. Vigilare: Toward snoop-based kernel integrity monitor. In ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_119_2","volume-title":"11th European Workshop on Systems Security, April 23, 2018","author":"Morbitzer Mathias","year":"2018","unstructured":"Mathias Morbitzer, Manuel Huber, Julian Horsch, and Sascha Wessel. 2018. SEVered: Subverting AMD\u2019s virtual machine encryption. In 11th European Workshop on Systems Security, April 23, 2018."},{"key":"e_1_3_2_120_2","volume-title":"IEEE Symposium on Security and Privacy","author":"Murdock Kit","year":"2020","unstructured":"Kit Murdock, David Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, and Frank Piessens. 2020. Plundervolt: Software-based fault injection attacks against Intel SGX. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2915318"},{"key":"e_1_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_123_2","volume-title":"2nd IEEE International Conference on Collaboration and Internet Computing, CIC 2016, Pittsburgh, PA, USA, November 1\u20133, 2016","author":"Ngabonziza Bernard","year":"2016","unstructured":"Bernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, and Sarah Martin. 2016. TrustZone explained: Architectural features and use cases. In 2nd IEEE International Conference on Collaboration and Internet Computing, CIC 2016, Pittsburgh, PA, USA, November 1\u20133, 2016."},{"key":"e_1_3_2_124_2","unstructured":"Nuvoton.com. 2018. NuMicro M2351 Series \u2013 a TrustZone Empowered Microcontroller Series Focusing on IoT Security. Retrieved from https:\/\/www.nuvoton.com\/products\/microcontrollers\/arm-cortex-m23-mcus\/m2351-series\/ [Accessed May 8 2024]."},{"key":"e_1_3_2_125_2","unstructured":"NVIDIA. 2023. NVIDIA H100 Tensor Core GPU Architecture. Retrieved from https:\/\/resources.nvidia.com\/en-us-tensor-core [Accessed May 8 2024]."},{"key":"e_1_3_2_126_2","unstructured":"Thomas Nyman Ghada Dessouky Shaza Zeitouni Aaro Lehikoinen Andrew Paverd N. Asokan and Ahmad-Reza Sadeghi. 2017. Hardscope: Thwarting DOP with Hardware-Assisted Run-Time Scope Enforcement. arXiv:1705.10295. Retrieved from https:\/\/arxiv.org\/abs\/1705.10295"},{"key":"e_1_3_2_127_2","unstructured":"University of Cambridge. 2019. Capability Hardware Enhanced RISC Instructions (CHERI). Retrieved from https:\/\/www.cl.cam.ac.uk\/research\/security\/ctsrd\/cheri\/ [Accessed May 8 2024]."},{"key":"e_1_3_2_128_2","doi-asserted-by":"publisher","DOI":"10.1145\/3224423"},{"key":"e_1_3_2_129_2","unstructured":"Openstack.org. 2021. Trusted Compute Pools. Retrieved from https:\/\/docs.openstack.org\/nova\/pike\/admin\/security.html [Accessed Feb 26 2024]."},{"key":"e_1_3_2_130_2","article-title":"Fourth generation software, hardware","author":"Opier Ascher","year":"1967","unstructured":"Ascher Opier. 1967. Fourth generation software, hardware. Datamation. Retrieved from DOI:https:\/\/archive.org\/details\/TNM_4th_generation_software_hardware_-_Datamation_20171010_0125","journal-title":"Datamation"},{"key":"e_1_3_2_131_2","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_132_2","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534805"},{"key":"e_1_3_2_133_2","volume-title":"2011 IEEE Symposium on Security and Privacy","author":"Parno Bryan","year":"2011","unstructured":"Bryan Parno, Jacob R. Lorch, John R. Douceur, James Mickens, and Jonathan M. McCune. 2011. Memoir: Practical state continuity for protected modules. In 2011 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_134_2","unstructured":"PCMag Staff. 2011. Is Intel Insider Code For Drm In Sandy Bridge? Retrieved fromDOI:https:\/\/www.pcmag.com\/archive\/is-intel-insider-code-for-drm-in-sandy-bridge-258868[Accessed May 8 2024]."},{"key":"e_1_3_2_135_2","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527429"},{"key":"e_1_3_2_136_2","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_137_2","doi-asserted-by":"publisher","DOI":"10.5555\/2666136"},{"key":"e_1_3_2_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2636078"},{"key":"e_1_3_2_139_2","volume-title":"Blackhat","author":"Rutkowska Joanna","year":"2008","unstructured":"Joanna Rutkowska and Rafa\u0142 Wojtczuk. 2008. Preventing and detecting Xen hypervisor subversions. In Blackhat. Retrieved from DOI:https:\/\/invisiblethingslab.com\/resources\/bh08\/part2-full.pdf[Accessed May 8, 2024]."},{"key":"e_1_3_2_140_2","volume-title":"CanSecWest Applied Security Conference","author":"Sacco Anibal L.","year":"2009","unstructured":"Anibal L. Sacco and Alfredo A. Ortega. 2009. Persistent BIOS infection. In CanSecWest Applied Security Conference. Retrieved from https:\/\/www.coresecurity.com\/sites\/default\/files\/private-files\/publications\/2016\/05\/Persistent-BIOS-Infection.pdf [Accessed May 8, 2024]."},{"key":"e_1_3_2_141_2","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541949"},{"key":"e_1_3_2_142_2","doi-asserted-by":"publisher","unstructured":"Muhammad Usama Sardar Saidgani Musaev and Christof Fetzer. 2021. Demystifying attestation in intel trust domain extensions via formal verification. IEEE Access 9 (2021) 83067\u201383079. DOI:10.1109\/ACCESS.2021.3087421","DOI":"10.1109\/ACCESS.2021.3087421"},{"key":"e_1_3_2_143_2","volume-title":"Types for the Chain of Trust: No (Loader) Write Left Behind","author":"Shapiro Rebecca","year":"2018","unstructured":"Rebecca Shapiro. 2018. Types for the Chain of Trust: No (Loader) Write Left Behind. Ph. D. Dissertation. Dartmouth College."},{"key":"e_1_3_2_144_2","volume-title":"24th Anal Network and Distributed System Security Symposium","author":"Shih Ming-Wei","year":"2017","unstructured":"Ming-Wei Shih, Sangho Lee, Taesoo Kim, and Marcus Peinado. 2017. T-SGX: Eradicating controlled-channel attacks against enclave programs. In 24th Anal Network and Distributed System Security Symposium."},{"key":"e_1_3_2_145_2","volume-title":"Proceedings of the 24st Annual Network and Distributed System Security Symposium, (NDSS)","author":"Shinde Shweta","year":"2017","unstructured":"Shweta Shinde, Dat Le Tien, Shruti Tople, and Prateek Saxena. 2017. Panoply: Low-TCB linux applications with SGX enclaves. In Proceedings of the 24st Annual Network and Distributed System Security Symposium, (NDSS)."},{"key":"e_1_3_2_146_2","unstructured":"A. J. Singh and Akshay Bhardwaj. 2014. Android internals and telephony. International Journal of Emerging Technology and Advanced Engineering 4 1 (2014) 51\u201359."},{"key":"e_1_3_2_147_2","unstructured":"N. Sklavos K. Touliou and C. Efstathiou. 2006. Exploiting cryptographic architectures over hardware vs. software implementations: Advantages and trade-offs. In Proceedings of the 5th WSEAS International Conference on Applications of Electrical Engineering Prague Czech Republic 147\u2013151."},{"key":"e_1_3_2_148_2","volume-title":"Black Hat Europe","author":"Sklyarov Dmitry","year":"2017","unstructured":"Dmitry Sklyarov. 2017. Intel ME: Flash file system explained. In Black Hat Europe. Retrieved from DOI:https:\/\/www.blackhat.com\/docs\/eu-17\/materials\/eu-17-Sklyarov-Intel-ME-Flash-File-System-Explained.pdf[Accessed May 8, 2024]."},{"key":"e_1_3_2_149_2","unstructured":"Igor Skochinsky. 2014. Intel ME Secrets. Retrieved from https:\/\/papers.put.as\/papers\/firmware\/2014\/Recon2014Skochinsky.pdf [Accessed May 8 2024]."},{"key":"e_1_3_2_150_2","volume-title":"43rd International Convention on Information, Communication and Electronic Technology","author":"Sladovi\u0107 D.","year":"2020","unstructured":"D. Sladovi\u0107, D. Topol\u010di\u0107, and D. Delija. 2020. Overview of Mac system security and its impact on digital forensics process. In 43rd International Convention on Information, Communication and Electronic Technology."},{"key":"e_1_3_2_151_2","volume-title":"A Brief History of Microprogramming","author":"Smotherman Mark","year":"2009","unstructured":"Mark Smotherman. 2009. A Brief History of Microprogramming. Technical Report. School Computing, Clemson University Clemson, SC, USA. Retrieved from DOI:https:\/\/ed-thelen.org\/comp-hist\/MicroprogrammingABriefHistoryOf.pdf"},{"key":"e_1_3_2_152_2","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Strackx Raoul","year":"2016","unstructured":"Raoul Strackx and Frank Piessens. 2016. Ariadne: A minimal approach to state continuity. In 25th USENIX Security Symposium (USENIX Security 16)."},{"key":"e_1_3_2_153_2","doi-asserted-by":"crossref","unstructured":"Chao Su and Qingkai Zeng. 2021. Survey of CPU cache-based side-channel attacks: Systematic analysis security models and countermeasures. Hindawi Security and Communication Networks Volume 2021 Article ID 5559552.","DOI":"10.1155\/2021\/5559552"},{"key":"e_1_3_2_154_2","volume-title":"ACM International Conference on Supercomputing","author":"Suh G. Edward","year":"2003","unstructured":"G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. 2003. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In ACM International Conference on Supercomputing."},{"key":"e_1_3_2_155_2","volume-title":"45th IEEE\/IFIP International Conference on Dependable Systems and Networks","author":"Sun He","year":"2015","unstructured":"He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, and Haining Wang. 2015. Trustice: Hardware-assisted isolated computing environments on mobile devices. In 45th IEEE\/IFIP International Conference on Dependable Systems and Networks."},{"key":"e_1_3_2_156_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0046-1"},{"key":"e_1_3_2_157_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132300.3132337"},{"key":"e_1_3_2_158_2","unstructured":"Tencent Blade Team. 2018. Exploring Qualcomm Baseband via ModKit. CanSecWest 2018."},{"key":"e_1_3_2_159_2","unstructured":"Alexander Tereshkin and Rafal Wojtczuk. 2009. Introducing Ring -3 Rootkits. Invisible Things Lab. Retrieved from https:\/\/invisiblethingslab.com\/resources\/bh09usa\/Ring%20-3%20Rootkits.pdf [Accessed May 8 2024]."},{"key":"e_1_3_2_160_2","volume-title":"Advanced Configuration and Power Interface (ACPI) Specification","author":"Inc. UEFI Forum","year":"2020","unstructured":"UEFI Forum Inc.2020. Advanced Configuration and Power Interface (ACPI) Specification. Technical Report. UEFI Forum Inc. Retrieved fromDOI:https:\/\/uefi.org\/sites\/default\/files\/resources\/ACPI_Spec_6_3_A_Oct_6_2020.pdf"},{"key":"e_1_3_2_161_2","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure, efficient in-process isolation with protection keys (MPK). In 28th USENIX Security Symposium (USENIX Security 19)."},{"key":"e_1_3_2_162_2","volume-title":"ACM SIGSAC Conference on Computer and Communications Security","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Frank Piessens, and Raoul Strackx. 2018. Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic. In ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_163_2","volume-title":"IEEE Symposium on Security and Privacy","author":"Schaik Stephan Van","year":"2019","unstructured":"Stephan Van Schaik, Alyssa Milburn, Sebastian \u00d6sterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2019. RIDL: Rogue in-flight data load. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_164_2","volume-title":"Annual Computer Security Applications Conference","author":"Wan Shengye","year":"2020","unstructured":"Shengye Wan, Mingshen Sun, Kun Sun, Ning Zhang, and Xu He. 2020. RusTEE: Developing memory-safe ARM TrustZone applications. In Annual Computer Security Applications Conference."},{"key":"e_1_3_2_165_2","volume-title":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security","author":"Wang Huibo","year":"2019","unstructured":"Huibo Wang, Erick Bauman, Vishal Karande, Zhiqiang Lin, Yueqiang Cheng, and Yinqian Zhang. 2019. Running language interpreters inside SGX: A lightweight, legacy-compatible script code hardening approach. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security."},{"key":"e_1_3_2_166_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354241"},{"key":"e_1_3_2_167_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_9"},{"key":"e_1_3_2_168_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_169_2","unstructured":"WikiChip.org. 2022. Innovation Engine (IE) - Intel. Retrieved from https:\/\/en.wikichip.org\/wiki\/intel\/innovation_engine [Accessed May 8 2024]."},{"key":"e_1_3_2_170_2","volume-title":"UEFI Secure Boot in Modern Computer Security Solutions","author":"Wilkins Richard","year":"2013","unstructured":"Richard Wilkins and Brian Richardson. 2013. UEFI Secure Boot in Modern Computer Security Solutions. Technical Report. UEFI.org. Retrieved from DOI:https:\/\/uefi.org\/sites\/default\/files\/resources\/UEFI_Secure_Boot_in_Modern_Computer_Security_Solutions_2013.pdf"},{"key":"e_1_3_2_171_2","unstructured":"Ally Winning. 2018. First Look at Nordic\u2019s \u201cCellular Made Easy\u201d nRF91 Low-Power Solution. Retrieved from https:\/\/www.eenewseurope.com\/en\/first-look-at-nordics-cellular-made-easy-nrf91-low-power-solution\/ [Accessed May 8 2024]."},{"key":"e_1_3_2_172_2","unstructured":"Rafal Wojtczuk and Corey Kallenberg. 2015. Attacking UEFI Boot Script. Retrieved from DOI:https:\/\/bromiumlabs.files.wordpress.com\/2015\/01\/venamis_whitepaper.pdf[Accessed May 8 2024]."},{"key":"e_1_3_2_173_2","volume-title":"Proc. 15th Annu. CanSecWest Conf.(CanSecWest)","author":"Wojtczuk Rafal","year":"2015","unstructured":"Rafal Wojtczuk and Corey Kallenberg. 2015. Attacks on UEFI security. In Proc. 15th Annu. CanSecWest Conf.(CanSecWest). Retrieved from https:\/\/repo.zenk-security.com\/Techniques%20d.attaques%20%20.%20%20Failles\/Attacks-on-UEFI-security.pdf [Accessed May 8, 2024]."},{"key":"e_1_3_2_174_2","unstructured":"Rafal Wojtczuk and Joanna Rutkowska. 2009. Attacking SMM Memory via Intel CPU Cache Poisoning. Retrieved from https:\/\/invisiblethingslab.com\/resources\/misc09\/smm_cache_fun.pdf [Accessed May 8 2024]."},{"key":"e_1_3_2_175_2","volume-title":"BlackHat USA","author":"Wojtczuk Rafal","year":"2009","unstructured":"Rafal Wojtczuk and Alexander Tereshkin. 2009. Attacking Intel BIOS. In BlackHat USA. Retrieved from DOI:https:\/\/www.blackhat.com\/presentations\/bh-usa-09\/WOJTCZUK\/BHUSA09-Wojtczuk-AtkIntelBios-SLIDES.pdf[Accessed May 8, 2024]."},{"key":"e_1_3_2_176_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853201"},{"key":"e_1_3_2_177_2","volume-title":"19th IEEE International Symposium on High Performance Computer Architecture","author":"Xia Yubin","year":"2013","unstructured":"Yubin Xia, Yutao Liu, and Haibo Chen. 2013. Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks. In 19th IEEE International Symposium on High Performance Computer Architecture."},{"key":"e_1_3_2_178_2","volume-title":"IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012)","author":"Xia Yubin","year":"2012","unstructured":"Yubin Xia, Yutao Liu, Haibo Chen, and Binyu Zang. 2012. CFIMon: Detecting violation of control flow integrity using performance counters. In IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012)."},{"key":"e_1_3_2_179_2","volume-title":"25th USENIX Security Symposium","author":"Xiao Yuan","year":"2016","unstructured":"Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, and Radu Teodorescu. 2016. One bit flips, one cloud flops: Cross-VM row hammer attacks and privilege escalation. In 25th USENIX Security Symposium."},{"key":"e_1_3_2_180_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_181_2","volume-title":"White Paper A Tour Beyond BIOS Launching a STM to Monitor SMM in EFI Developer Kit II","author":"Yao Jiewen","year":"2015","unstructured":"Jiewen Yao and Vincent J. Zimmer. 2015. White Paper A Tour Beyond BIOS Launching a STM to Monitor SMM in EFI Developer Kit II. Technical Report. Intel Corporation."},{"key":"e_1_3_2_182_2","volume-title":"White Paper A Tour Beyond BIOS Implementing S3 Resume with EDKII","author":"Yao Jiewen","year":"2014","unstructured":"Jiewen Yao, Vincent J. Zimmer, and Star Zeng. 2014. White Paper A Tour Beyond BIOS Implementing S3 Resume with EDKII. Technical Report. Intel Corporation."},{"key":"e_1_3_2_183_2","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack. In 23rd USENIX Security Symposium (USENIX Security 14)."},{"key":"e_1_3_2_184_2","volume-title":"2014 IEEE 25th International Symposium on Software Reliability Engineering","author":"Ye Ding","year":"2014","unstructured":"Ding Ye, Yu Su, Yulei Sui, and Jingling Xue. 2014. WPBound: Enforcing spatial memory safety efficiently at runtime with weakest preconditions. In 2014 IEEE 25th International Symposium on Software Reliability Engineering."},{"key":"e_1_3_2_185_2","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523661"},{"key":"e_1_3_2_186_2","volume-title":"2019 26th Asia-Pacific Software Engineering Conference (APSEC)","author":"Zhang Denghui","year":"2019","unstructured":"Denghui Zhang, Guosai Wang, Wei Xu, and Kevin Gao. 2019. SGXPy: Protecting integrity of python applications with intel SGX. In 2019 26th Asia-Pacific Software Engineering Conference (APSEC)."},{"key":"e_1_3_2_187_2","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043576"},{"key":"e_1_3_2_188_2","volume-title":"10th ACM Symposium on Information, Computer and Communications Security","author":"Zhang Fengwei","year":"2015","unstructured":"Fengwei Zhang, Kevin Leach, Haining Wang, and Angelos Stavrou. 2015. Trustlogin: Securing password-login on commodity operating systems. In 10th ACM Symposium on Information, Computer and Communications Security."},{"key":"e_1_3_2_189_2","volume-title":"European Symposium on Research in Computer Security","author":"Zhang Fengwei","year":"2014","unstructured":"Fengwei Zhang, Haining Wang, Kevin Leach, and Angelos Stavrou. 2014. A framework to secure peripherals at runtime. In European Symposium on Research in Computer Security."},{"key":"e_1_3_2_190_2","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2948621"},{"key":"e_1_3_2_191_2","first-page":"980","article-title":"TruSpy: Cache side-channel information leakage from the secure world on ARM devices","volume":"2016","author":"Zhang Ning","year":"2016","unstructured":"Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, and Y. Thomas Hou. 2016. TruSpy: Cache side-channel information leakage from the secure world on ARM devices. IACR Cryptology ePrint Archive 2016 (2016), 980.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_192_2","volume-title":"2018 IEEE Conference on Computer Communications, INFOCOM 2018, Honolulu, HI, USA","author":"Zhang Ning","year":"2018","unstructured":"Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, and Y. Thomas Hou. 2018. TruSense: Information leakage from trustzone. In 2018 IEEE Conference on Computer Communications, INFOCOM 2018, Honolulu, HI, USA."},{"key":"e_1_3_2_193_2","volume-title":"32nd USENIX Security Symposium","author":"Zhang Yiming","year":"2023","unstructured":"Yiming Zhang, Yuxin Hu, Zhenyu Ning, Fengwei Zhang, Xiapu Luo, Haoyang Huang, Shoumeng Yan, and Zhengyu He. 2023. SHELTER: Extending arm CCA with isolation in user space. In 32nd USENIX Security Symposium."},{"key":"e_1_3_2_194_2","volume-title":"European Symposium on Research in Computer Security","author":"Zhou Lei","year":"2019","unstructured":"Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang, and Guojun Wang. 2019. Nighthawk: Transparent system introspection from ring-3. In European Symposium on Research in Computer Security."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672392","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:57:49Z","timestamp":1750294669000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672392"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":193,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2024,12,31]]}},"alternative-id":["10.1145\/3672392"],"URL":"https:\/\/doi.org\/10.1145\/3672392","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10]]},"assertion":[{"value":"2022-11-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}