{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:02002115","sets":["1164:1867:11897:1746755291135"]},"path":["1746755291135"],"owner":"80578","recid":"2002115","title":["ハードウェア・ソフトウェア・理論の連携によるユニバーサルTEEアーキテクチャの実現に向けて―システムソフトウェアの観点から―"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2025-05-14"},"_buckets":{"deposit":"9e0b3a44-da5a-45ce-863b-3e7740252a86"},"_deposit":{"id":"2002115","pid":{"type":"depid","value":"2002115","revision_id":0},"owners":[80578],"status":"published","created_by":80578},"item_title":"ハードウェア・ソフトウェア・理論の連携によるユニバーサルTEEアーキテクチャの実現に向けて―システムソフトウェアの観点から―","author_link":[],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ハードウェア・ソフトウェア・理論の連携によるユニバーサルTEEアーキテクチャの実現に向けて―システムソフトウェアの観点から―","subitem_title_language":"ja"}]},"item_type_id":"4","publish_date":"2025-05-14","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報・システム研究機構データサイエンス共同利用基盤施設セキュアコンピュータシステム研究開発センター/大妻女子大学"},{"subitem_text_value":"早稲田大学"},{"subitem_text_value":"慶應義塾大学"},{"subitem_text_value":"九州工業大学"},{"subitem_text_value":"情報・システム研究機構データサイエンス共同利用基盤施設セキュアコンピュータシステム研究開発センター/国立情報学研究所/総合研究大学院大学"},{"subitem_text_value":"東京大学"},{"subitem_text_value":"情報セキュリティ大学院大学"},{"subitem_text_value":"情報・システム研究機構データサイエンス共同利用基盤施設セキュアコンピュータシステム研究開発センター/国立情報学研究所/総合研究大学院大学"},{"subitem_text_value":"東京大学"},{"subitem_text_value":"情報・システム研究機構データサイエンス共同利用基盤施設セキュアコンピュータシステム研究開発センター/国立情報学研究所/総合研究大学院大学"},{"subitem_text_value":"東京農工大学"},{"subitem_text_value":"日本電気株式会社"},{"subitem_text_value":"セコム株式会社"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Center for R&D on Secure Computer Systems, Joint Support-Center for Data Science Research, Research Organization of Information and Systems / Otsuma Women's University","subitem_text_language":"en"},{"subitem_text_value":"Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Keio University","subitem_text_language":"en"},{"subitem_text_value":"Kyushu Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Center for R&D on Secure Computer Systems, Joint Support-Center for Data Science Research, Research Organization of Information and Systems / National Institute of Informatics / The Grad. Univ. for Advanced Studies","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"Institute of Information Security","subitem_text_language":"en"},{"subitem_text_value":"Center for R&D on Secure Computer Systems, Joint Support-Center for Data Science Research, Research Organization of Information and Systems / National Institute of Informatics / The Grad. Univ. for Advanced Studies","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"Center for R&D on Secure Computer Systems, Joint Support-Center for Data Science Research, Research Organization of Information and Systems / National Institute of Informatics / The Grad. Univ. for Advanced Studies","subitem_text_language":"en"},{"subitem_text_value":"Tokyo University of Agriculture & Technology","subitem_text_language":"en"},{"subitem_text_value":"NEC Corp.","subitem_text_language":"en"},{"subitem_text_value":"SECOM Co., Ltd.","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/2002115/files/IPSJ-OS25167004.pdf","label":"IPSJ-OS25167004.pdf"},"date":[{"dateType":"Available","dateValue":"2027-05-14"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-OS25167004.pdf","filesize":[{"value":"2.0 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"11"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"7faec74e-eeac-4f9c-93f9-950129df2f00","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2025 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"石川,裕"}]},{"creatorNames":[{"creatorName":"木村,啓二"}]},{"creatorNames":[{"creatorName":"河野,健二"}]},{"creatorNames":[{"creatorName":"光来,健一"}]},{"creatorNames":[{"creatorName":"五島,正裕"}]},{"creatorNames":[{"creatorName":"塩谷,亮太"}]},{"creatorNames":[{"creatorName":"須崎,有康"}]},{"creatorNames":[{"creatorName":"関山,太朗"}]},{"creatorNames":[{"creatorName":"高前田,伸也"}]},{"creatorNames":[{"creatorName":"竹房,あつ子"}]},{"creatorNames":[{"creatorName":"中條,拓伯"}]},{"creatorNames":[{"creatorName":"古川,潤"}]},{"creatorNames":[{"creatorName":"宮澤,慎一"}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10444176","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8795","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"内閣府が進める経済安全保障重要技術育成プログラム(K Program)のひとつである「セキュアなデータ流通を支える暗号関連技術(高機能暗号)」に採択された研究開発課題「ハードウェア・ソフトウェア・理論の連携によるユニバーサルTEEアーキテクチャの実現」の研究開発構想について,システムソフトウェアの観点から紹介する.本課題は2025年4月から5ヵ年のプロジェクトであり,IoTからクラウドまで多様なプラットフォームにおいて、その要求・脅威モデルに応じて、セキュリティ・性能・消費エネルギーのトレードオフを考慮し,適切な保護領域構成等を選べる単一のTEEアーキテクチャを実現する。このためにハードウェア・ソフトウェア・理論の3分野が連携する.ハードウェアは自由度の高いTEEプリミティブを提供し,それを用いてシステムソフトウェアは柔軟に保護領域を構成する.理論としては、TEEプリミティブを用いて構成される保護領域が想定した脅威モデルに対してセキュアかどうかを検証する形式検証技術を開発する.提案TEE上でセキュアに高機能暗号処理を実行できるソフトウェア環境を開発し,PoCとしてセキュアなデータ流通を実現するアプリケーションのプロトタイプを実装する.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"9","bibliographic_titles":[{"bibliographic_title":"研究報告システムソフトウェアとオペレーティング・システム(OS)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2025-05-14","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicVolumeNumber":"2025-OS-167"}]},"relation_version_is_last":true,"weko_creator_id":"80578"},"id":2002115,"updated":"2025-05-09T02:04:45.441608+00:00","links":{},"created":"2025-05-09T02:04:41.169952+00:00"}