{"updated":"2025-01-19T20:10:46.619928+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00204499","sets":["1:9834:9918"]},"path":["9918"],"owner":"44499","recid":"204499","title":["ハードウェアセキュリティの最新動向:5.Trusted Execution Environmentによるシステムの堅牢化"],"pubdate":{"attribute_name":"公開日","attribute_value":"2020-05-15"},"_buckets":{"deposit":"499976ad-6c80-412e-9cee-ef839703f1ef"},"_deposit":{"id":"204499","pid":{"type":"depid","value":"204499","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"ハードウェアセキュリティの最新動向:5.Trusted Execution Environmentによるシステムの堅牢化","author_link":["506460","506462","506461","506463"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ハードウェアセキュリティの最新動向:5.Trusted Execution Environmentによるシステムの堅牢化"},{"subitem_title":"Latest Trends in on Hardware Security : 5. System Hardening by Trusted Execution Environment","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"特集","subitem_subject_scheme":"Other"}]},"item_type_id":"1","publish_date":"2020-05-15","item_1_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"TRASIO/産業技術総合研究所"},{"subitem_text_value":"NEC/横浜国立大学"}]},"item_1_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Technology Research Association of Secure IoT Edge Application Based on RISC-V Open Architecture (TRASIO) / National Institute of Advanced Industrial Science and Technology (AIST)","subitem_text_language":"en"},{"subitem_text_value":"NEC Corp. / Yokohama National Univ.","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/204499/files/IPSJ-MGN610610.pdf","label":"IPSJ-MGN610610.pdf"},"date":[{"dateType":"Available","dateValue":"2022-05-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-MGN610610.pdf","filesize":[{"value":"1.0 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"21df2f83-aef2-4bf4-b2e7-b7977b09b233","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2020 by the Information Processing Society of Japan"}]},"item_1_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"須崎, 有康"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"佐々木, 貴之"}],"nameIdentifiers":[{}]}]},"item_1_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"SUZAKI, Kuniyasu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"SASAKI, Takayuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_1_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116625","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"article"}]},"item_1_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年のOSは再規模/複雑になっており,脆弱なコードの混入を完全には取り除くことができない.このため,物理的にOSとは隔離して実行する機能であるTrusted Execution Environment (TEE)が高機能なCPUでは備わっている.よく使われているCPUのTEEとしては ARMのTrustZone,IntelのSGX(Software Guard Extensions),RISC-VのKeystoneが挙げられる.残念なことに,それぞれのTEE実装はそのコンセプトやターゲットが異なり,誤解を招いている.本論文ではそれぞてのTEE実装について解説するとともにその違いについて説明する.また,活用分野の理解を深めるためにユースケースとして鍵管理,ペイメント機構,プライバシー保護などを紹介する.","subitem_description_type":"Other"}]},"item_1_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"579","bibliographic_titles":[{"bibliographic_title":"情報処理"}],"bibliographicPageStart":"576","bibliographicIssueDates":{"bibliographicIssueDate":"2020-05-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"6","bibliographicVolumeNumber":"61"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:06:46.142997+00:00","id":204499,"links":{}}