{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T15:49:22Z","timestamp":1760888962212,"version":"3.40.4"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319132563"},{"type":"electronic","value":"9783319132570"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13257-0_35","type":"book-chapter","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T10:43:57Z","timestamp":1415011437000},"page":"542-554","source":"Crossref","is-referenced-by-count":5,"title":["A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices"],"prefix":"10.1007","author":[{"given":"Javier","family":"Gonz\u00e1lez","sequence":"first","affiliation":[]},{"given":"Michael","family":"H\u00f6lzl","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Riedl","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Bonnet","sequence":"additional","affiliation":[]},{"given":"Ren\u00e9","family":"Mayrhofer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"The Privacy Engineer\u2019s Manifesto, pp. 242\u2013243. Apress (2014)"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Andrus, J., Dall, C., Hof, A.V., Laadan, O., Nieh, J.: Cells: A virtual mobile smartphone architecture. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pp. 173\u2013187. ACM (2011)","DOI":"10.1145\/2043556.2043574"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Arbaugh, W., Farber, D., Smith, J.: A secure and reliable bootstrap architecture. In: Symposium on Security and Privacy, pp. 65\u201371 (May 1997)","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"35_CR4","unstructured":"ARM Security Technology. Building a secure system using trustzone technology. Technical report, ARM (2009)"},{"key":"35_CR5","first-page":"239","volume-title":"Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys 2011","author":"E. Chin","year":"2011","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys 2011, pp. 239\u2013252. ACM, New York (2011)"},{"key":"35_CR6","unstructured":"Doctorow, C.: Lockdown, the coming war on general-purpose computing"},{"key":"35_CR7","unstructured":"Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The digital distributed system security architecture. In: Proceedings of the 12th National Computer Security Conference, pp. 305\u2013319 (1989)"},{"key":"35_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1007\/978-3-319-03584-0_35","volume-title":"Cyberspace Safety and Security","author":"J. Gonz\u00e1lez","year":"2013","unstructured":"Gonz\u00e1lez, J., Bonnet, P.: Towards an open framework leveraging a trusted execution environment. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol.\u00a08300, pp. 458\u2013467. Springer, Heidelberg (2013)"},{"key":"35_CR9","unstructured":"Goodacre, J.: Technology preview: The armv8 architecture. White paper. Technical report, ARM (2011)"},{"issue":"5","key":"35_CR10","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1506409.1506429","volume":"52","author":"J.A. Halderman","year":"2009","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold-boot attacks on encryption keys. Commun. ACM\u00a052(5), 91\u201398 (2009)","journal-title":"Commun. ACM"},{"key":"35_CR11","unstructured":"H\u00f6barth, S., Mayrhofer, R.: A framework for on-device privilege escalation exploit execution on android. In: Proceedings of IWSSI\/SPMU (June 2011)"},{"key":"35_CR12","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1145\/2536853.2536947","volume-title":"Proc. MoMM 2013: International Conference on Advances in Mobile Computing Multimedia","author":"M. H\u00f6lzl","year":"2013","unstructured":"H\u00f6lzl, M., Mayrhofer, R., Roland, M.: Requirements for an open ecosystem for embedded tamper resistant hardware on mobile devices. In: Proc. MoMM 2013: International Conference on Advances in Mobile Computing Multimedia, pp. 249\u2013252. ACM, New York (2013)"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Khan, S., Nauman, M., Othman, A., Musa, S.: How secure is your smartphone: An analysis of smartphone security mechanisms. In: Intl. Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec 2012), pp. 76\u201381 (2012)","DOI":"10.1109\/CyberSec.2012.6246082"},{"key":"35_CR14","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/1165389.945467","volume":"37","author":"S.T. King","year":"2003","unstructured":"King, S.T., Chen, P.M.: Backtracking intrusions. ACM SIGOPS Operating Systems Review\u00a037, 223\u2013236 (2003)","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"1","key":"35_CR15","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1109\/SURV.2012.013012.00028","volume":"15","author":"M. Polla La","year":"2013","unstructured":"La Polla, M., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Communications Surveys Tutorials\u00a015(1), 446\u2013471 (2013)","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Lee, H.-C., Kim, C.H., Yi, J.H.: Experimenting with system and libc call interception attacks on arm-based linux kernel. In: Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 631\u2013632. ACM (2011)","DOI":"10.1145\/1982185.1982323"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Liebergeld, S., Lange, M.: Android security, pitfalls and lessons learned. In: Information Sciences and Systems (2013)","DOI":"10.1007\/978-3-319-01604-7_40"},{"key":"35_CR18","doi-asserted-by":"crossref","unstructured":"Madlmayr, G., Langer, J., Kantner, C., Scharinger, J.: NFC Devices: Security and Privacy, pp. 642\u2013647 (2008)","DOI":"10.1109\/ARES.2008.105"},{"key":"35_CR19","unstructured":"Mobile Phone Work Group. TCG mobile trusted module sepecification version 1 rev 7.02. Technical report (April 2010)"},{"key":"35_CR20","doi-asserted-by":"crossref","unstructured":"Poeplau, S., Fratantonio, Y., Bianchi, A., Kruegel, C., Vigna, G.: Execute this! analyzing unsafe and malicious dynamic code loading in android applications. In: Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA (February 2014)","DOI":"10.14722\/ndss.2014.23328"},{"issue":"3","key":"35_CR21","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S1353-4858(12)70045-4","volume":"2012","author":"J. Rouse","year":"2012","unstructured":"Rouse, J.: Mobile devices - the most hostile environment for security? Network Security\u00a02012(3), 11\u201313 (2012)","journal-title":"Network Security"},{"key":"35_CR22","unstructured":"Trusted Computing Group. TPM main specification version 1.2 rev. 116. Technical report (March 2011)"},{"key":"35_CR23","unstructured":"Unified EFI. UEFI specification version 2.2. Technical report(November 2010)"},{"key":"35_CR24","unstructured":"Wu, T.: The secure remote password protocol. In: Proc. of the 1998 Internet Society Network and Distributed System Security Symposium, pp. 97\u2013111 (November 1998)"},{"key":"35_CR25","doi-asserted-by":"crossref","unstructured":"Wurster, G., Van Oorschot, P.C.: A control point for reducing root abuse of file-system privileges. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 224\u2013236. ACM (2010)","DOI":"10.1145\/1866307.1866333"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13257-0_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T05:57:37Z","timestamp":1746511057000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13257-0_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319132563","9783319132570"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13257-0_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}