{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:36:23Z","timestamp":1773246983808,"version":"3.50.1"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030224950","type":"print"},{"value":"9783030224967","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22496-7_9","type":"book-chapter","created":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T13:02:34Z","timestamp":1559739754000},"page":"133-151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["On the Performance of ARM TrustZone"],"prefix":"10.1007","author":[{"given":"Julien","family":"Amacher","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1493-6603","authenticated-orcid":false,"given":"Valerio","family":"Schiavoni","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,6,6]]},"reference":[{"key":"9_CR1","unstructured":"AArch64 Exception Handling - System calls to EL2\/EL3. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.den0024a\/ch10s02s04.html"},{"key":"9_CR2","unstructured":"Android Trusty TEE. https:\/\/source.android.com\/security\/trusty"},{"key":"9_CR3","unstructured":"Arctic MX-4. https:\/\/www.arctic.ac\/ch_en\/mx-4.html"},{"key":"9_CR4","unstructured":"ARM Everywhere. https:\/\/hexus.net\/static\/arm-everywhere\/"},{"key":"9_CR5","unstructured":"ARM Financial Results. https:\/\/www.arm.com\/company\/investors\/financial-results"},{"key":"9_CR6","unstructured":"ARM Inside The Numbers - 100bn. https:\/\/community.arm.com\/processors\/b\/blog\/posts\/inside-the-numbers-100-billion-arm-based-chips-1345571105"},{"key":"9_CR7","unstructured":"ARM TrustZone Developer. https:\/\/developer.arm.com\/technologies\/trustzone"},{"key":"9_CR8","unstructured":"ARM1176JZF-S Technical Reference Manual - 2.12.13. Secure Monitor Call (SMC). http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.ddi0301h\/ch02s12s13.html"},{"key":"9_CR9","unstructured":"Benchmark framework. https:\/\/github.com\/OP-TEE\/optee_os\/blob\/master\/documentation\/benchmark.md"},{"key":"9_CR10","unstructured":"$${\\rm clock}\\_{\\rm gettime(3)}$$ - Linux man page. https:\/\/linux.die.net\/man\/3\/clock_gettime"},{"key":"9_CR11","unstructured":"Consuming Unmanaged DLL Functions. https:\/\/docs.microsoft.com\/en-us\/dotnet\/framework\/interop\/consuming-unmanaged-dll-functions"},{"key":"9_CR12","unstructured":"Cortex-A9 Technical Reference Manual - 6.3. Memory Access Sequence. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.ddi0388f\/Ciheiecd.html. Accessed 12 Sept 2018"},{"key":"9_CR13","unstructured":"CVE-2017-5715. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-5715"},{"key":"9_CR14","unstructured":"CVE-2017-5753. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-5753"},{"key":"9_CR15","unstructured":"CVE-2017-5754. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-5754"},{"key":"9_CR16","unstructured":"CVE-2018-3639. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-3639"},{"key":"9_CR17","unstructured":"Flir E4. https:\/\/www.flir.com\/products\/e4\/"},{"key":"9_CR18","unstructured":"gettimeofday(2) - Linux man page. https:\/\/linux.die.net\/man\/2\/gettimeofday"},{"key":"9_CR19","unstructured":"Hikey: trying to allocate more physical memory to secure world. https:\/\/github.com\/OP-TEE\/optee_os\/issues\/1396"},{"key":"9_CR20","unstructured":"How to alloc 10M memory by TEE$$\\_$$Malloc(). https:\/\/github.com\/OP-TEE\/optee_os\/issues\/2090"},{"key":"9_CR21","unstructured":"Intel SGX. https:\/\/software.intel.com\/en-us\/sgx"},{"key":"9_CR22","unstructured":"Kingston Embedded Solutions. https:\/\/www.kingston.com\/en\/embedded\/emmc"},{"key":"9_CR23","unstructured":"Microsoft OpenEnclave Framework. https:\/\/github.com\/Microsoft\/openenclave"},{"key":"9_CR24","unstructured":"OP-TEE Build on Github. https:\/\/github.com\/OP-TEE\/build. Accessed 12 Apr 2018"},{"key":"9_CR25","unstructured":"OP-TEE FAQ on Github. https:\/\/github.com\/OP-TEE\/OP-TEE_website\/tree\/master\/faq. Accessed 12 Apr 2018"},{"key":"9_CR26","unstructured":"OP-TEE OS on Github. https:\/\/github.com\/OP-TEE\/optee_os. Accessed 12 Apr 2018"},{"key":"9_CR27","unstructured":"OP-TEE Raspberry 3B platform specific documentation. https:\/\/www.op-tee.org\/docs\/rpi3\/"},{"key":"9_CR28","unstructured":"OP-TEE sanity testsuite on Github. https:\/\/github.com\/OP-TEE\/optee_test. Accessed 12 Apr 2018"},{"key":"9_CR29","unstructured":"OP-TEE source. https:\/\/github.com\/OP-TEE\/optee_os\/blob\/master\/core\/arch\/arm\/kernel\/generic_entry_a64.S. Accessed 12 Sept 2018"},{"key":"9_CR30","unstructured":"OP-TEE Supplicant on Github. https:\/\/github.com\/OP-TEE\/optee_client\/tree\/master\/tee-supplicant. Accessed 12 Apr 2018"},{"key":"9_CR31","unstructured":"OPTEE-OS kernel thread.c init$$\\_$$canaries. https:\/\/github.com\/OP-TEE\/optee_os\/blob\/master\/core\/arch\/arm\/kernel\/thread.c#L150"},{"key":"9_CR32","unstructured":"POWER-Z KM001C. http:\/\/www.chargerlab.com\/archives\/536.html"},{"key":"9_CR33","unstructured":"Qemu. https:\/\/www.qemu.org. Accessed 12 Apr 2018"},{"key":"9_CR34","unstructured":"QEMU with WIP TrustZone Support. https:\/\/git.linaro.org\/virtualization\/qemu-tz.git"},{"key":"9_CR35","unstructured":"Shared memory size bigger than 1 MB. https:\/\/github.com\/OP-TEE\/optee_os\/issues\/1523"},{"key":"9_CR36","unstructured":"Stress-NG. https:\/\/kernel.ubuntu.com\/~cking\/stress-ng\/. Accessed 20 Jan 2019"},{"key":"9_CR37","unstructured":"TEE$$\\_$$BigIntAdd fails when dest=op OP-TEE OS Issue #2577. https:\/\/github.com\/OP-TEE\/optee_os\/issues\/2577"},{"key":"9_CR38","unstructured":"TRUSTSONIC. https:\/\/www.trustonic.com\/solutions\/trustonic-solutions-iot"},{"key":"9_CR39","unstructured":"Using more than 1 Mb with TEE$$\\_$$Malloc. https:\/\/github.com\/OP-TEE\/optee_os\/issues\/2178"},{"key":"9_CR40","unstructured":"VMware ESXi. https:\/\/www.vmware.com\/products\/esxi-and-esx.html"},{"key":"9_CR41","unstructured":"Workloads and governor effects. https:\/\/www.ibm.com\/developerworks\/library\/l-cpufreq-3\/"},{"key":"9_CR42","unstructured":"ARM: ARM\u00ae CoreLink$$^{{\\rm TM}}$$ TZC-400 TrustZone\u00aeAddress Space Controller (2014)"},{"key":"9_CR43","unstructured":"ARM Limited: SMC CALLING CONVENTION System Software on ARM\u00ae Platforms (2016)"},{"key":"9_CR44","doi-asserted-by":"crossref","unstructured":"Barbosa, M., et al.: SAFETHINGS: data security by design in the IoT. In: 2017 13th European Conference on Dependable Computing Conference (EDCC), pp. 117\u2013120. IEEE (2017)","DOI":"10.1109\/EDCC.2017.33"},{"key":"9_CR45","doi-asserted-by":"crossref","unstructured":"Cho, H., et al.: Prime+Count: novel cross-world covert channels on ARM trustzone. In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, New York, NY, USA, pp. 441\u2013452. ACM (2018)","DOI":"10.1145\/3274694.3274704"},{"key":"9_CR46","unstructured":"Brodowski, D.: CPU frequency and voltage scaling code in the Linux(tm) kernel (2018)"},{"key":"9_CR47","unstructured":"Gartner: Leading the IoT Gartner Insights on How to Lead in a Connected World (2017)"},{"key":"9_CR48","unstructured":"Greenhalgh, P.: big.LITTLE processing with arm cortex-a15 & cortex-a7. ARM White paper 17 (2011)"},{"key":"9_CR49","unstructured":"Hua, Z., Gu, J., Xia, Y., Chen, H., Zang, B., Guan, H.: vTZ: virtualizing ARM trustzone. In: Proceedings of the 26th USENIX Security Symposium (2017)"},{"key":"9_CR50","doi-asserted-by":"crossref","unstructured":"Lentz, M., Sen, R., Druschel, P., Bhattacharjee, B.: SeCloak: ARM trustzone-based mobile peripheral control, pp. 1\u201313, June 2018","DOI":"10.1145\/3210240.3210334"},{"key":"9_CR51","unstructured":"Lipp, M., et al.: Nethammer: Inducing Rowhammer Faults through Network Requests. arXiv preprint arXiv:1805.04956 (2018)"},{"key":"9_CR52","doi-asserted-by":"crossref","unstructured":"McGillion, B., Dettenborn, T., Nyman, T., Asokan, N.: Open-TEE-an open virtual trusted execution environment. In: Proceedings of the 2015 IEEE Trustcom\/BigDataSE\/ISPA, vol. 01, pp. 400\u2013407. IEEE Computer Society (2015)","DOI":"10.1109\/Trustcom.2015.400"},{"key":"9_CR53","unstructured":"NCC Group: Implementing practical electrical glitching attacks (2015)"},{"key":"9_CR54","unstructured":"nVidia: Trusted Little Kernel (TLK) for Tegra, FOSS edn. (2015)"},{"key":"9_CR55","unstructured":"Reddy, A.K., Paramasivam, P., Vemula, P.B.: Mobile secure data protection using eMMC RPMB partition. In: 2015 International Conference on Computing and Network Communications (CoCoNet), pp. 946\u2013950. IEEE (2015)"},{"key":"9_CR56","unstructured":"G-Technology: GlobalPlatform TEE Client API Specification v1.0 (2019)"},{"key":"9_CR57","unstructured":"G-Technology: TEE Internal Core API Specification Version 1.1.2.50 (2018)"}],"container-title":["Lecture Notes in Computer Science","Distributed Applications and Interoperable Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22496-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T00:04:53Z","timestamp":1685923493000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22496-7_9"}},"subtitle":["(Practical Experience Report)"],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030224950","9783030224967"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22496-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Distributed Applications and Interoperable Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kongens Lyngby","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dais2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.discotec.org\/2019\/dais","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}