{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:44:26Z","timestamp":1742913866885,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031651748"},{"type":"electronic","value":"9783031651755"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-65175-5_15","type":"book-chapter","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T14:43:01Z","timestamp":1721918581000},"page":"206-220","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LightArmor: A Lightweight Trusted Operating System Isolation Approach for\u00a0Mobile Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2547-3667","authenticated-orcid":false,"given":"Nan","family":"Jiang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8565-1923","authenticated-orcid":false,"given":"Qihang","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8376-3235","authenticated-orcid":false,"given":"Xiaoqi","family":"Jia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9965-0876","authenticated-orcid":false,"given":"Jiayun","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4153-6883","authenticated-orcid":false,"given":"Qingjia","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2783-3232","authenticated-orcid":false,"given":"Haichao","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,26]]},"reference":[{"key":"15_CR1","unstructured":"Common vulnerabilities and exposures. https:\/\/cve.mitre.org\/cve\/search_cve_list.html"},{"key":"15_CR2","unstructured":"Danial, A.: Cloc. https:\/\/github.com\/AlDanial\/cloc"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Azab, A.M., et al.: Hypervision across worlds: real-time kernel protection from the arm trustzone secure world. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 90\u2013102 (2014)","DOI":"10.1145\/2660267.2660350"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Azab, A.M., et al.: SKEE: a lightweight secure kernel-level execution environment for arm. In: NDSS, vol.\u00a016, pp. 21\u201324 (2016)","DOI":"10.14722\/ndss.2016.23009"},{"key":"15_CR5","unstructured":"Babchuk, V.: optee: enable dynamic SHM support. https:\/\/patchwork.kernel.org\/project\/linux-arm-kernel\/patch\/1506621851-6929-13-git-send-email-volodymyr_babchuk@epam.com\/ (2017)"},{"key":"15_CR6","unstructured":"Beniamini, G.: Trustzone kernel privilege escalation (CVE-2016-2431). http:\/\/bits-please.blogspot.com\/2016\/06\/trustzone-kernel-privilege-escalation.html (2016)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Brasser, F., Gens, D., Jauernig, P., Sadeghi, A.R., Stapf, E.: Sanctuary: arming trustzone with user-space enclaves. In: NDSS (2019)","DOI":"10.14722\/ndss.2019.23448"},{"key":"15_CR8","unstructured":"Cerdeira, D., Martins, J., Santos, N., Pinto, S.: $$\\{$$ReZone$$\\}$$: disarming $$\\{$$TrustZone$$\\}$$ with $$\\{$$TEE$$\\}$$ privilege reduction. In: USENIX Security (2022)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Cerdeira, D., Santos, N., Fonseca, P., Pinto, S.: SoK: understanding the prevailing security vulnerabilities in trustzone-assisted tee systems. In: S &P (2020)","DOI":"10.1109\/SP40000.2020.00061"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Cho, Y., Kwon, D., Yi, H., Paek, Y.: Dynamic virtual address range adjustment for intra-level privilege separation on arm. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23024"},{"key":"15_CR11","unstructured":"Cho, Y., Shin, J., Kwon, D., Ham, M., Kim, Y., Paek, Y.: $$\\{$$Hardware-Assisted$$\\}$$$$\\{$$On-Demand$$\\}$$ hypervisor activation for efficient security critical code execution on mobile devices. In: 2016 USENIX Annual Technical Conference (USENIX ATC 2016), pp. 565\u2013578 (2016)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Dautenhahn, N., Kasampalis, T., Dietz, W., Criswell, J., Adve, V.: Nested kernel: an operating system architecture for intra-kernel privilege separation. In: Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 191\u2013206 (2015)","DOI":"10.1145\/2775054.2694386"},{"key":"15_CR13","unstructured":"Nascimento, E.: Cache side-channel attack AES (2017). https:\/\/github.com\/enascimento\/cache_side-channel_attack_aes"},{"key":"15_CR14","unstructured":"Evenchick, E.: Rustzone: writing trusted applications in rust (2018). https:\/\/github.com\/ericevenchick\/rustzone"},{"key":"15_CR15","unstructured":"Guilbon, C.: Attacking the arm\u2019s trustzone (2018). https:\/\/blog.quarkslab.com\/attacking-the-arms-trustzone.html"},{"key":"15_CR16","unstructured":"Hua, Z., Gu, J., Xia, Y., Chen, H., Zang, B., Guan, H.: $$\\{$$vTZ$$\\}$$: virtualizing $$\\{$$ARM$$\\}$$$$\\{$$TrustZone$$\\}$$. In: 26th USENIX Security Symposium (USENIX Security 2017), pp. 541\u2013556 (2017)"},{"issue":"5","key":"15_CR17","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1109\/TDSC.2016.2622261","volume":"15","author":"J Jang","year":"2016","unstructured":"Jang, J., et al.: PrivateZone: providing a private execution environment using arm TrustZone. IEEE Trans. Dependable Secure Comput. 15(5), 797\u2013810 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Kim, Y., Imani, M., Patil, S., Rosing, T.S.: CAUSE: critical application usage-aware memory system using non-volatile memory for mobile devices. In: 2015 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), pp. 690\u2013696. IEEE (2015)","DOI":"10.1109\/ICCAD.2015.7372637"},{"issue":"6","key":"15_CR19","doi-asserted-by":"publisher","first-page":"1434","DOI":"10.1109\/TMC.2019.2910861","volume":"19","author":"D Kwon","year":"2019","unstructured":"Kwon, D., Seo, J., Cho, Y., Lee, B., Paek, Y.: PrOS: light-weight privatized se cure OSes in arm trustzone. IEEE Trans. Mob. Comput. 19(6), 1434\u20131447 (2019)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"15_CR20","unstructured":"laginimaineb: Extracting qualcomm\u2019s keymaster keys (2016). https:\/\/bits-please.blogspot.com\/2016\/06\/extracting-qualcomms-keymaster-keys.html"},{"key":"15_CR21","unstructured":"laginimaineb: War of the worlds - hijacking the Linux kernel from QSEE (2016). https:\/\/bits-please.blogspot.com\/2016\/05\/war-of-worlds-hijacking-linux-kernel.html"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Li, W., Xia, Y., Lu, L., Chen, H., Zang, B.: TEEv: virtualizing trusted execution environments on mobile platforms. In: Proceedings of the 15th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments, pp. 2\u201316 (2019)","DOI":"10.1145\/3313808.3313810"},{"key":"15_CR23","unstructured":"Linaro: OP-TEE TOS. https:\/\/github.com\/OP-TEE\/optee_os"},{"key":"15_CR24","unstructured":"Linaro: OP-TEE Xtest framework (2016). https:\/\/github.com\/OP-TEE\/optee_test"},{"key":"15_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"DA Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1\u201320. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11605805_1"},{"key":"15_CR26","unstructured":"riscure: Breaking tee security part 3: escalating privileges. https:\/\/www.riscure.com\/blog\/tee-security-samsung-teegris-part-3\/"},{"key":"15_CR27","unstructured":"Shen, D.: Attacking your trusted core (2015). https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Shen-Attacking-Your-Trusted-Core-Exploiting-Trustzone-On-Android.pdf"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Sun, H., Sun, K., Wang, Y., Jing, J., Wang, H.: TrustICE: hardware-assisted isolated computing environments on mobile devices. In: 2015 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 367\u2013378. IEEE (2015)","DOI":"10.1109\/DSN.2015.11"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Wan, S., Sun, M., Sun, K., Zhang, N., He, X.: RusTEE: developing memory-safe ARM TrustZone applications. In: Annual Computer Security Applications Conference, pp. 442\u2013453 (2020)","DOI":"10.1145\/3427228.3427262"},{"key":"15_CR30","unstructured":"Yarom, Y., Falkner, K.: $$\\{$$FLUSH+ RELOAD$$\\}$$: a high resolution, low noise, L3 cache $$\\{$$Side-Channel$$\\}$$ attack. In: USENIX security (2014)"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Zhao, S., Zhang, Q., Qin, Y., Feng, W., Feng, D.: SecTEE: a software-based approach to secure enclave architecture using tee. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (2019)","DOI":"10.1145\/3319535.3363205"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Jia, X., Jiang, N.: Protecting virtual machines against untrusted hypervisor on ARM64 cloud platform. In: ICC (2022)","DOI":"10.1109\/ICC45855.2022.9839069"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Jia, X., Zhang, S., Jiang, N., Chen, J., Zhang, W.: SecFortress: securing hypervisor using cross-layer isolation. In: IPDPS (2022)","DOI":"10.1109\/IPDPS53621.2022.00029"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-65175-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T14:45:22Z","timestamp":1721918722000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-65175-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031651748","9783031651755"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-65175-5_15","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"26 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Edinburgh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipsec2024.co.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}