{"created":"2025-01-19T01:01:58.577096+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00197522","sets":["1164:1579:9681:9819"]},"path":["9819"],"owner":"44499","recid":"197522","title":["OpenRISCにおけるセキュアコンテクストスイッチの実装"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-06-04"},"_buckets":{"deposit":"12a0560a-5baf-417e-9c31-359dc83a388a"},"_deposit":{"id":"197522","pid":{"type":"depid","value":"197522","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"OpenRISCにおけるセキュアコンテクストスイッチの実装","author_link":["473963","473961","473960","473964","473962","473959"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"OpenRISCにおけるセキュアコンテクストスイッチの実装"},{"subitem_title":"An Implementation of Secure Context Switch for OpenrRISC","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ・高信頼技術","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2019-06-04","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京大学"},{"subitem_text_value":"東京大学"},{"subitem_text_value":"東京大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"University of Tokyo","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/197522/files/IPSJ-ARC19236016.pdf","label":"IPSJ-ARC19236016.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-ARC19236016.pdf","filesize":[{"value":"366.8 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"16"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"2d7aee85-c1d5-4d3c-b516-2b271cf5e172","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"有馬, 裕一朗"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"坂井, 修一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"入江, 英嗣"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuichiro, Arima","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shuichi, Sakai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hidetsugu, Irie","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10096105","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8574","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"セキュアプロセッサはクラウドサービスが展開され仮想環境をもちいて複数の VM を動かしている中で,プログラム実行の対タンパ性を飛躍的に高めることを可能にする.しかし,現状のセキュアプロセッサは OS を改変することが必要であり,OS が改変しづらい状況ではセキュアプロセッサ単体で得られる信頼性を落としてしまう.そこで,本論文では OS の改変が不要なセキュアプロセッサ開発の一環としてコンテクストスイッチに着目し,ハードウェアコンテクストスイッチを提案する.まず,コンテクストスイッチがどのように行われるのかを Linux を用いて説明し,コンテクストスイッチ時にデータの盗聴を防ぐためにハードウエア上にコンテクストスイッチを実装する方法を解説する.ハードウェア上でコンテクストスイッチが実行されている様子を図やコンテクストスイッチ実行回数を見ることで示す.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Secure processors make it possible to dramatically improve anti-tampering performance in the situation cloud services are deployed and multiple VMs are running in a virtual environment. But when you use secure processors, you should modify operating systems, that make the reliability obtained by the secure processor alone reduced. In this paper, we focus on the context switch and propose a hardware context switch as part of the development of a secure processor that does not require modification of the OS. First, we explain how the context switch is performed using Linux. Second, we explain how to implement the context switch on hardware to prevent data interception at the time of context switch. And we show how the hardware context switch is in action by the figures and the table for the number of context switch exection.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"4","bibliographic_titles":[{"bibliographic_title":"研究報告システム・アーキテクチャ(ARC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2019-06-04","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"16","bibliographicVolumeNumber":"2019-ARC-236"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":197522,"updated":"2025-01-19T22:18:56.993476+00:00","links":{}}