{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:04:25Z","timestamp":1771661065377,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_58","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"868-884","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Securing Mobile Systems GPS and Camera Functions Using TrustZone Framework"],"prefix":"10.1007","author":[{"given":"Ammar S.","family":"Salman","sequence":"first","affiliation":[]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"58_CR1","unstructured":"National Vulnerability Database (NVD), National institute of standards and technology (NIST). https:\/\/nvd.nist.gov\/vuln. Accessed Nov 2020"},{"key":"58_CR2","unstructured":"Ying, K., Ahlawat, A., Alsharifi, B., Jiang, Y., Thavai, P., Du, W.: TruZ-Droid: integrating TrustZone with mobile operating system. In: MobiSys 2018, Munich, Germany, 10\u201315 June 2018. http:\/\/www.cis.syr.edu\/~wedu\/Research\/paper\/mobisys2018_truzdroid.pdf"},{"key":"58_CR3","unstructured":"ARM security technology building a secure system using TrustZone\u00ae technology. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf"},{"key":"58_CR4","unstructured":"Section 3 ARM TrustZone - OP-TEE - global platform. https:\/\/optee.readthedocs.io\/en\/latest\/architecture\/globalplatform_api.html"},{"key":"58_CR5","unstructured":"Saroi, S., Wolman, A.: Enabling new mobile applications with location proofs. In: Microsoft Research, HotMobile 2009, Santa Cruz, CA, USA, 23\u201324 February 2009. https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/proofs.pdf"},{"key":"58_CR6","unstructured":"Lentz, M., Sen, R., Druschel, P., Bhattacharjee, B.: SeCloak: ARM Trustzone-based mobile peripheral control. In: MobiSys 2018, Munich, Germany, 10\u201315 June 2018. https:\/\/www.cs.umd.edu\/~mlentz\/papers\/secloak_mobisys2018.pdf"},{"key":"58_CR7","unstructured":"Mobile location confirmation documentation. https:\/\/developer.visa.com\/capabilities\/mlc\/docs"},{"key":"58_CR8","unstructured":"Yalew, S.D., Mendonca, P., Maguire Jr., G.Q., Haridi, S., Correia, M.: TruApp: a TrustZone-based authenticity detection service for mobile apps. In: IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (2017). http:\/\/www.gsd.inesc-id.pt\/~mpc\/pubs\/truapp-final.pdf"},{"key":"58_CR9","doi-asserted-by":"publisher","unstructured":"Demesie, S., Dar, B., Maguire Jr., Q., Haridi, S., Correia, M., T2Droid: a TrustZone-based dynamic analyzer for android applications. In: Computing and Communications (IEEE TrustCom 2017), August 2017. https:\/\/doi.org\/10.1109\/Trustcom\/BigDataSE\/ICESS.2017.243. https:\/\/www.researchgate.net\/publication\/318824757_T2Droid_A_TrustZone-Based_Dynamic_Analyser_for_Android_Applications","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.243"},{"key":"58_CR10","doi-asserted-by":"crossref","unstructured":"Suciu, D., Sion, R.: Droids entry: efficient code integrity and control flow verification on TrustZone devices. In: 21st International Conference on Control Systems and Computer Science (2017). https:\/\/www.computer.org\/csdl\/proceedings\/cscs\/2017\/1839\/00\/07968556.pdf","DOI":"10.1109\/CSCS.2017.28"},{"key":"58_CR11","doi-asserted-by":"crossref","unstructured":"Zhao, B., Xiao, Y., Huang, Y., Cui, X.: A private user data protection mechanism in TrustZone architecture based on identity authentication. Tsinghua Sci. Technol. 22(2) (2017). https:\/\/ieeexplore.ieee.org\/document\/7889643","DOI":"10.23919\/TST.2017.7889643"},{"key":"58_CR12","unstructured":"Zheng, X., Yang, L., Shi, G., Meng, D.: Secure mobile payment employing trusted computing on TrustZone enabled platforms. In: IEEE Trustcom\/BigDataSE\/ISPA (2006). https:\/\/ieeexplore.ieee.org\/document\/7847180"},{"key":"58_CR13","doi-asserted-by":"crossref","unstructured":"Janjua, H., Joosen, W., Michiels, S., Hughes, D.: Trusted operations on sensor data. Sensors 18, 1364 (2018). https:\/\/ieeexplore.ieee.org\/document\/7590042","DOI":"10.3390\/s18051364"},{"key":"58_CR14","unstructured":"Burke, J., et al.: Participatory sensing. Center for Embedded Networked Sensing (CENS), University of California, Los Angeles (2006). https:\/\/escholarship.org\/uc\/item\/19h777qd"},{"key":"58_CR15","doi-asserted-by":"crossref","unstructured":"Liu, H., Saroiu, S., Wolman, A., Raj, H.: Software abstractions for trusted sensors. In: Proceedings of the ACM 10th International Conference on Mobile Systems, Applications, and Services, Low Wood Bay, UK, pp. 365\u2013378, 25\u201329 June 2012. https:\/\/www.microsoft.com\/en-us\/research\/publication\/software-abstractions-for-trusted-sensors\/","DOI":"10.1145\/2307636.2307670"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:13:41Z","timestamp":1771658021000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_58","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}