{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:26:49Z","timestamp":1772119609825,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030004699","type":"print"},{"value":"9783030004705","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00470-5_18","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T06:43:19Z","timestamp":1536216199000},"page":"380-400","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices"],"prefix":"10.1007","author":[{"given":"Chen","family":"Cao","sequence":"first","affiliation":[]},{"given":"Le","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Neng","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ji","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Wenjing","family":"Lou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"18_CR1","unstructured":"Apache Software Foundation: Apache HTTP server benchmarking tool (2017). http:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html"},{"key":"18_CR2","unstructured":"ARM Holdings: mbed TLS (2017). https:\/\/tls.mbed.org\/"},{"key":"18_CR3","unstructured":"ARM Ltd.: Arm cortex-a57 mpcore processor technical reference manual (2013)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Azab, A.M., et al.: Hypervision across worlds: real-time kernel protection from the arm trustzone secure world. In: ACM CCS (2014)","DOI":"10.1145\/2660267.2660350"},{"key":"18_CR5","unstructured":"Becher, M., Dornseif, M., Klein, C.: Firewire: all your memory are belong to us. In: 6th Annual CanSecWest Conference (2005)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Chan, E.M., Carlyle, J.C., David, F.M., Farivar, R., Campbell, R.H.: Bootjacker: compromising computers using forced restarts. In: 15th ACM CCS. ACM (2008)","DOI":"10.1145\/1455770.1455840"},{"key":"18_CR7","unstructured":"Chow, J., et al.: Understanding data lifetime via whole system simulation. In: USENIX SEC (2004)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Colp, P., et al.: Protecting data on smartphones and tablets from memory attacks. In: ASPLOS 2015. ACM (2015)","DOI":"10.1145\/2694344.2694380"},{"key":"18_CR9","unstructured":"CVE Details: The Ultimate Security Vulnerability Datasource (2018). https:\/\/www.cvedetails.com\/vendor\/33\/Linux.html . Accessed 29 Mar 2018"},{"key":"18_CR10","unstructured":"FuturePlus System: DDR2 800 bus analysis probe (2006). http:\/\/www.futureplus.com\/download\/datasheet\/fs2334_ds.pdf"},{"key":"18_CR11","unstructured":"Garcia-Morchon, O., Kumar, S., Struik, R., Keoh, S., Hummen, R.: Security considerations in the IP-based internet of things (2013)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M.: Data lifetime is a systems problem. In: 11th ACM SIGOPS European Workshop (2004)","DOI":"10.1145\/1133572.1133599"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"G\u00f6tzfried, J., M\u00fcller, T., Drescher, G., N\u00fcrnberger, S., Backes, M.: RamCrypt: kernel-based address space encryption for user-mode processes. In: 11th ACM Asia CCS. ACM (2016)","DOI":"10.1145\/2897845.2897924"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"G\u00f6tzfried, J., et al.: Hypercrypt: hypervisor-based encryption of kernel and user space. In: ARES 2016 (2016)","DOI":"10.1109\/ARES.2016.13"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Guan, L., et al.: Trustshadow: secure execution of unmodified applications with arm trustzone. In: ACM MobiSys (2017)","DOI":"10.1145\/3081333.3081349"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Halderman, J.A., et al.: Lest we remember: cold boot attacks on encryption keys. In: USENIX SEC (2008)","DOI":"10.1145\/1506409.1506429"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Harrison, K., Xu, S.: Protecting cryptographic keys from memory disclosure attacks. In: IEEE\/IFIP DSN (2007)","DOI":"10.1109\/DSN.2007.77"},{"key":"18_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-642-38980-1_19","volume-title":"Applied Cryptography and Network Security","author":"M Henson","year":"2013","unstructured":"Henson, M., Taylor, S.: Beyond full disk encryption: protection on security-enhanced commodity processors. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 307\u2013321. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38980-1_19"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Henson, M., Taylor, S.: Memory encryption: a survey of existing techniques. ACM CSUR (2014)","DOI":"10.1145\/2566673"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Jang, J., Kong, S., Kim, M., Kim, D., Kang, B.B.: Secret: secure channel between rich execution environment and trusted execution environment. In: NDSS 2015 (2015)","DOI":"10.14722\/ndss.2015.23189"},{"key":"18_CR21","unstructured":"Kleissner, P.: Hibernation file attack (2010)"},{"key":"18_CR22","unstructured":"Kolontsov, V.: Solaris (and others) ftpd core dump bug (1996). http:\/\/insecure.org\/sploits\/ftpd.pasv.html"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Li, W., Li, H., Chen, H., Xia, Y.: Adattester: secure online mobile advertisement attestation using trustzone. In: ACM MobiSys (2015)","DOI":"10.1145\/2742647.2742676"},{"key":"18_CR24","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/356989.357005","volume":"35","author":"D Lie","year":"2000","unstructured":"Lie, D.: Architectural support for copy and tamper resistant software. ACM SIGPLAN Not. 35, 168\u2013177 (2000)","journal-title":"ACM SIGPLAN Not."},{"key":"18_CR25","unstructured":"McVoy, L., Staelin, C.: Lmbench: portable tools for performance analysis. In: USENIX ATC (1996)"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"M\u00fcller, T., Spreitzenbarth, M., Freiling, F.: FROST: forensic recovery of scrambled telephones. In: 11th ACNS (2013)","DOI":"10.1007\/978-3-642-38980-1_23"},{"key":"18_CR27","unstructured":"National Vulnerability Database: CVE-2011-2707 (2011). http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=2011-2707"},{"key":"18_CR28","unstructured":"National Vulnerability Database: CVE-2005-1264 (2015). https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2005-1264"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Peterson, P.A.: Cryptkeeper: improving security with encrypted RAM. In: IEEE HST (2010)","DOI":"10.1109\/THS.2010.5655081"},{"key":"18_CR30","unstructured":"Provos, N.: Encrypting virtual memory. In: USENIX SEC (2000)"},{"key":"18_CR31","unstructured":"Reese, W.: Nginx: the high-performance web server and reverse proxy (2008). https:\/\/nginx.org\/"},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Santos, N., Raj, H., Saroiu, S., Wolman, A.: Using ARM trustzone to build a trusted language runtime for mobile applications. In: ASPLOS 2014. ACM (2014)","DOI":"10.1145\/2541940.2541949"},{"key":"18_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-37300-8_2","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"P Stewin","year":"2013","unstructured":"Stewin, P., Bystrov, I.: Understanding DMA malware. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 21\u201341. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37300-8_2"},{"key":"18_CR34","unstructured":"Suiche, M.: Windows hibernation file for fun \u2018n\u2019 profit. Black-Hat (2008)"},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Wilson, P., et al.: Implementing embedded security on dual-virtual-CPU systems. IEEE Des. Test Comput. (2007)","DOI":"10.1109\/MDT.2007.196"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, N., Sun, K., Lou, W., Hou, Y.T.: Case: cache-assisted secure execution on arm processors. In: IEEE S&P (2016)","DOI":"10.1109\/SP.2016.13"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00470-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T16:38:52Z","timestamp":1571848732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00470-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030004699","9783030004705"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00470-5_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}