{"id":227728,"updated":"2025-01-19T12:05:27.230190+00:00","links":{},"created":"2025-01-19T01:26:58.929930+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00227728","sets":["581:11107:11118"]},"path":["11118"],"owner":"44499","recid":"227728","title":["A Trial to Embed RAM Encryption Scheme in Cryptographic Programs"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-09-15"},"_buckets":{"deposit":"7e33a8d0-f8e1-4aea-8343-df722141e139"},"_deposit":{"id":"227728","pid":{"type":"depid","value":"227728","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"A Trial to Embed RAM Encryption Scheme in Cryptographic Programs","author_link":["607045","607044","607047","607050","607041","607042","607046","607049","607043","607048"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"A Trial to Embed RAM Encryption Scheme in Cryptographic Programs"},{"subitem_title":"A Trial to Embed RAM Encryption Scheme in Cryptographic Programs","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[一般論文] Cryptography, Software protection, RAM encryption","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2023-09-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Yokohama National University"},{"subitem_text_value":"Yokohama National University"},{"subitem_text_value":"R&D Group, Hitachi, Ltd."},{"subitem_text_value":"R&D Group, Hitachi, Ltd."},{"subitem_text_value":"Yokohama National University"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"R&D Group, Hitachi, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"R&D Group, Hitachi, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/227728/files/IPSJ-JNL6409033.pdf","label":"IPSJ-JNL6409033.pdf"},"date":[{"dateType":"Available","dateValue":"2025-09-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6409033.pdf","filesize":[{"value":"866.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"50d8404d-6094-40b6-bbc8-6dc1bdc12ec3","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tsutomu, Matsumoto"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Junichi, Sakamoto"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Manami, Suzuki"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Dai, Watanabe"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Naoki, Yoshida"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tsutomu, Matsumoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Junichi, Sakamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Manami, Suzuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Dai, Watanabe","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Naoki, Yoshida","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_publisher_15":{"attribute_name":"公開者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"The RAM encryption encrypts the data on memory to prevent data leakage from an adversary to eavesdrop the memory space of the target program. The well-known implementation is Intel SGX, whose RAM encryption mechanism is definitely hardware dependent. In contrast, Watanabe et al. proposed a fully software-based RAM encryption scheme (SBRES). In this paper, we developed the tools for embedding the SBRES in C source codes for its practical application. We applied the tools to the source codes of some cryptographic implementations in Mbed TLS and confirmed that the tools successfully embedded the SBRES functionality in the cryptographic implementations.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.31(2023) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.31.700\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The RAM encryption encrypts the data on memory to prevent data leakage from an adversary to eavesdrop the memory space of the target program. The well-known implementation is Intel SGX, whose RAM encryption mechanism is definitely hardware dependent. In contrast, Watanabe et al. proposed a fully software-based RAM encryption scheme (SBRES). In this paper, we developed the tools for embedding the SBRES in C source codes for its practical application. We applied the tools to the source codes of some cryptographic implementations in Mbed TLS and confirmed that the tools successfully embedded the SBRES functionality in the cryptographic implementations.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.31(2023) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.31.700\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2023-09-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicVolumeNumber":"64"}]},"relation_version_is_last":true,"weko_creator_id":"44499"}}