{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:57:14Z","timestamp":1770227834675,"version":"3.49.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031157769","type":"print"},{"value":"9783031157776","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15777-6_19","type":"book-chapter","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:24:33Z","timestamp":1661268273000},"page":"342-358","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["TZ-IMA: Supporting Integrity Measurement for\u00a0Applications with\u00a0ARM TrustZone"],"prefix":"10.1007","author":[{"given":"Liantao","family":"Song","sequence":"first","affiliation":[]},{"given":"Yan","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Pan","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Chuang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"key":"19_CR1","unstructured":"Arm trustzone. https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone"},{"key":"19_CR2","unstructured":"An overview of the linux integrity subsystem. https:\/\/sourceforge.net\/projects\/linux-ima\/files\/linux-ima\/Integrity_overview.pdf"},{"key":"19_CR3","unstructured":"Amd opteron a1100 (2016). http:\/\/www.amd.com\/en-gb\/products\/server\/opteron-a-series"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Azab, A.M., et al.: Hypervision across worlds: real-time kernel protection from the arm trustzone secure world. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 90\u2013102 (2014)","DOI":"10.1145\/2660267.2660350"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Bohling, F., Mueller, T., Eckel, M., Lindemann, J.: Subverting linux\u2019 integrity measurement architecture. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2020)","DOI":"10.1145\/3407023.3407058"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Davi, L., Sadeghi, A.R., Winandy, M.: Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. In: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, pp. 49\u201354 (2009)","DOI":"10.1145\/1655108.1655117"},{"key":"19_CR7","unstructured":"Foley, M.J.: Windows server on arm: it\u2019s happening. Website (2017). http:\/\/www.zdnet.com\/article\/windows-server-on-arm-its-happening\/"},{"key":"19_CR8","unstructured":"Ge, X., Vijayakumar, H., Jaeger, T.: Sprobes: enforcing kernel code integrity on the trustzone architecture. arXiv preprint arXiv:1410.7747 (2014)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Guan, L., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M., Jaeger, T.: Trustshadow: Secure execution of unmodified applications with arm trustzone. In: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, pp. 488\u2013501 (2017)","DOI":"10.1145\/3081333.3081349"},{"key":"19_CR10","unstructured":"Han, S., Park, J.: Shadow-box v2: the practical and omnipotent sandbox for arm. Slideshow at Blackhat Asia (2018)"},{"issue":"1","key":"19_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume, K., Rosado, D.G., Fern\u00e1ndez-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1), 1\u201313 (2013)","journal-title":"J. Internet Serv. Appl."},{"key":"19_CR12","unstructured":"Hua, Z., Gu, J., Xia, Y., Chen, H., Zang, B., Guan, H.: vTZ: virtualizing ARM trustzone. In: 26th USENIX Security Symposium (USENIX Security 2017), pp. 541\u2013556 (2017)"},{"issue":"9","key":"19_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-019-2707-6","volume":"64","author":"Z Hua","year":"2021","unstructured":"Hua, Z., Yu, Y., Gu, J., Xia, Y., Chen, H., Zang, B.: TZ-container: protecting container from untrusted OS with ARM trustzone. SCIENCE CHINA Inf. Sci. 64(9), 1\u201316 (2021)","journal-title":"SCIENCE CHINA Inf. Sci."},{"issue":"3","key":"19_CR14","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/3308755.3308761","volume":"22","author":"W Li","year":"2019","unstructured":"Li, W., Xia, Y., Chen, H.: Research on ARM trustzone. GetMobile Mob. Comput. Commun. 22(3), 17\u201322 (2019)","journal-title":"GetMobile Mob. Comput. Commun."},{"key":"19_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102240","volume":"119","author":"Z Ling","year":"2021","unstructured":"Ling, Z., et al.: Secure boot, trusted boot and remote attestation for ARM trustzone-based IoT nodes. J. Syst. Architect. 119, 102240 (2021)","journal-title":"J. Syst. Architect."},{"key":"19_CR16","unstructured":"Luo, W., Shen, Q., Xia, Y., Wu, Z.: Container-IMA: a privacy-preserving integrity measurement architecture for containers. In: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), pp. 487\u2013500 (2019)"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Machiry, A., et al.: Boomerang: exploiting the semantic gap in trusted execution environments. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23227"},{"key":"19_CR18","unstructured":"McVoy, L.W., Staelin, C., et al.: LMbench: portable tools for performance analysis. In: USENIX Annual Technical Conference, San Diego, CA, USA, pp. 279\u2013294 (1996)"},{"key":"19_CR19","unstructured":"Morgan, T.P.: ARM servers: Cavium is a contender with ThunderX (2015). https:\/\/www.nextplatform.com\/2015\/12\/09\/arm-servers-cavium-is-a-contender-with-thunderx\/"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Ning, P.: Samsung Knox and enterprise mobile security. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, p. 1 (2014)","DOI":"10.1145\/2666620.2666632"},{"key":"19_CR21","unstructured":"OP-TEE. https:\/\/github.com\/OP-TEE\/"},{"key":"19_CR22","unstructured":"Perez, R., Sailer, R., van Doorn, L., et al.: vTPM: virtualizing the trusted platform module. In: Proceedings of the 15th Conference on USENIX Security Symposium, pp. 305\u2013320 (2006)"},{"key":"19_CR23","unstructured":"Raj, H., et al.: fTPM: a software-only implementation of a TPM chip. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 841\u2013856 (2016)"},{"key":"19_CR24","unstructured":"Sailer, R., Zhang, X., Jaeger, T., Van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: USENIX Security Symposium, vol. 13, pp. 223\u2013238 (2004)"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Santos, N., Raj, H., Saroiu, S., Wolman, A.: Using arm trustzone to build a trusted language runtime for mobile applications. In: Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 67\u201380 (2014)","DOI":"10.1145\/2541940.2541949"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Son, J., et al.: Quantitative analysis of measurement overhead for integrity verification. In: Proceedings of the Symposium on Applied Computing, pp. 1528\u20131533 (2017)","DOI":"10.1145\/3019612.3019738"},{"key":"19_CR27","unstructured":"UnixBench (2016). https:\/\/sourceforge.net\/projects\/unixbench5\/"},{"key":"19_CR28","unstructured":"US-CERT\/NIST: CVE-2015-4421 in Huawei Mate7 (2015). https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015- 4421"},{"key":"19_CR29","first-page":"1","volume":"2020","author":"Z Wang","year":"2020","unstructured":"Wang, Z., Zhuang, Y., Yan, Z.: TZ-MRAS: a remote attestation scheme for the mobile terminal based on arm trustzone. Secur. Commun. Netw. 2020, 1\u201316 (2020)","journal-title":"Secur. Commun. Netw."},{"key":"19_CR30","unstructured":"IMAI Wiki: https:\/\/sourceforge.net\/p\/linux-ima\/wiki\/Home\/"},{"key":"19_CR31","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.future.2018.05.064","volume":"109","author":"D Zhang","year":"2020","unstructured":"Zhang, D., You, S.: iFlask: isolate flask security system from dangerous execution environment by using ARM trustzone. Futur. Gener. Comput. Syst. 109, 531\u2013537 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"3","key":"19_CR32","first-page":"166","volume":"44","author":"WYY Zhi","year":"2018","unstructured":"Zhi, W.Y.Y.: Kernel integrity measurement architecture based on TPM 2.0. Comput. Eng. 44(3), 166\u2013170 (2018)","journal-title":"Comput. Eng."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15777-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:08:03Z","timestamp":1709831283000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15777-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031157769","9783031157776"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15777-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}