{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T13:15:55Z","timestamp":1755695755888,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319184661"},{"type":"electronic","value":"9783319184678"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18467-8_37","type":"book-chapter","created":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T12:12:03Z","timestamp":1431087123000},"page":"557-570","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"Sabt","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Achemlal","sequence":"additional","affiliation":[]},{"given":"Abdelmadjid","family":"Bouabdallah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,9]]},"reference":[{"key":"37_CR1","unstructured":"ARM Holdings plc. Annual report 2013: Strategic report (2013)"},{"key":"37_CR2","unstructured":"Trustonic (2014). https:\/\/www.trustonic.com (accessed: January 2, 2015)"},{"issue":"3","key":"37_CR3","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1504\/IJES.2006.014859","volume":"2","author":"J Alves-Foss","year":"2006","unstructured":"Alves-Foss, J., Oman, P.W., Taylor, C., Harrison, W.S.: The MILS Architecture for High-Assurance Embedded Systems. International Journal of Embedded Systems 2(3), 239\u2013247 (2006)","journal-title":"International Journal of Embedded Systems"},{"key":"37_CR4","unstructured":"ARMLtd. ARM Security Technology - Building a Secure System using TrustZone Technology (2009)"},{"issue":"8","key":"37_CR5","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1109\/JPROC.2014.2332007","volume":"102","author":"N Asokan","year":"2014","unstructured":"Asokan, N., Ekberg, J.E., Kostiainen, K., Rajan, A., Rozas, C., Sadeghi, A.R., Schulz, S., Wachsmann, C.: Mobile Trusted Computing. Proceedings of the IEEE 102(8), 1189\u20131206 (2014)","journal-title":"Proceedings of the IEEE"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Azab, A.M., Ning, P., Shah, J., Chen, Q., Bhutkar, R., Ganesh, G., Ma, J., Shen, W.: Hypervision across worlds: real-time kernel protection from the ARM trustzone secure world. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 90\u2013102. ACM, New York (2014)","DOI":"10.1145\/2660267.2660350"},{"issue":"4","key":"37_CR7","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1145\/2644865.2541946","volume":"49","author":"C Dall","year":"2014","unstructured":"Dall, C., Nieh, J.: KVM\/ARM: The Design and Implementation of the Linux ARM Hypervisor. SIGPLAN Not. 49(4), 333\u2013348 (2014)","journal-title":"SIGPLAN Not."},{"key":"37_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/978-3-319-10359-4_18","volume-title":"Mobile Web Information Systems","author":"MA El-Serngawy","year":"2014","unstructured":"El-Serngawy, M.A., Talhi, C.: Securing business data on android smartphones. In: Awan, I., Younas, M., Franch, X., Quer, C. (eds.) MobiWIS 2014. LNCS, vol. 8640, pp. 218\u2013232. Springer, Heidelberg (2014)"},{"issue":"1","key":"37_CR9","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding Android Security. IEEE Security and Privacy 7(1), 50\u201357 (2009)","journal-title":"IEEE Security and Privacy"},{"issue":"5","key":"37_CR10","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1145\/1165389.945464","volume":"37","author":"T Garfinkel","year":"2003","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A Virtual Machine-based Platform for Trusted Computing. SIGOPS Oper. Syst. Rev. 37(5), 193\u2013206 (2003)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"37_CR11","volume-title":"Building a Secure Computer System","author":"M Gasser","year":"1988","unstructured":"Gasser, M.: Building a Secure Computer System. Van Nostrand Reinhold Co., New York (1988)"},{"key":"37_CR12","unstructured":"Grawrock, D.: The Intel Safer Computing Initiative: Building Blocks for Trusted Computing. Books by engineers, for engineers. Intel Press (2006)"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Gudeth, K., Pirretti, M., Hoeper, K., Buskey, R.: Delivering secure applications on commercial mobile devices: the case for bare metal hypervisors. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011, pp. 33\u201338. ACM, New York (2011)","DOI":"10.1145\/2046614.2046622"},{"issue":"5","key":"37_CR14","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1506409.1506429","volume":"52","author":"JA Halderman","year":"2009","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest We Remember: Cold-boot Attacks on Encryption Keys. Commun. ACM 52(5), 91\u201398 (2009)","journal-title":"Commun. ACM"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Hwang, J.-Y., Suh, S.-B., Heo, S.-K., Park, C.-J., Ryu, J.-M., Park, S.-Y., Kim, C.-R., Xen, A.R.M.: System virtualization using xen hypervisor for ARM-based secure mobile phones. In: Proceedings of the 5th IEEE International Conference on Consumer Communications and Networking, CCNC 2008, pp. 257\u2013261, January 2008","DOI":"10.1109\/ccnc08.2007.64"},{"key":"37_CR16","doi-asserted-by":"crossref","unstructured":"Klein, G., Andronick, J., Elphinstone, K., Murray, T., Sewell, T., Kolanski, R., Heiser, G.: Comprehensive Formal Verification of an OS Microkernel. ACM Trans. Comput. Syst. 32(1), 2:1\u20132:70 (2014)","DOI":"10.1145\/2560537"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Kostiainen, K., Ekberg, J.-E., Asokan, N., Rantala, A.: On-board credentials with open provisioning. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 2009, pp. 104\u2013115. ACM, New York (2009)","DOI":"10.1145\/1533057.1533074"},{"issue":"1","key":"37_CR18","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"BW Lampson","year":"1974","unstructured":"Lampson, B.W.: Protection. SIGOPS Oper. Syst. Rev. 8(1), 18\u201324 (1974)","journal-title":"SIGOPS Oper. Syst. Rev."},{"issue":"5","key":"37_CR19","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1145\/1165389.945463","volume":"37","author":"D Lie","year":"2003","unstructured":"Lie, D., Thekkath, C.A., Horowitz, M.: Implementing an Untrusted Operating System on Trusted Hardware. SIGOPS Oper. Syst. Rev. 37(5), 178\u2013192 (2003)","journal-title":"SIGOPS Oper. Syst. Rev."},{"issue":"2","key":"37_CR20","doi-asserted-by":"publisher","first-page":"74","DOI":"10.4236\/jis.2010.12009","volume":"1","author":"VR Pandya","year":"2010","unstructured":"Pandya, V.R., Stamp, M.: iPhone Security Analysis. Journal of Information Security 1(2), 74\u201387 (2010)","journal-title":"Journal of Information Security"},{"issue":"5","key":"37_CR21","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1067627.806586","volume":"15","author":"JM Rushby","year":"1981","unstructured":"Rushby, J.M.: Design and Verification of Secure Systems. SIGOPS Oper. Syst. Rev. 15(5), 12\u201321 (1981)","journal-title":"SIGOPS Oper. Syst. Rev."},{"issue":"1","key":"37_CR22","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1145\/2654822.2541949","volume":"42","author":"N Santos","year":"2014","unstructured":"Santos, N., Raj, H., Saroiu, S., Wolman, A.: Using ARM Trustzone to Build a Trusted Language Runtime for Mobile Applications. SIGARCH Comput. Archit. News 42(1), 67\u201380 (2014)","journal-title":"SIGARCH Comput. Archit. News"},{"issue":"5","key":"37_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1095809.1095812","volume":"39","author":"A Seshadri","year":"2005","unstructured":"Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems. SIGOPS Oper. Syst. Rev. 39(5), 1\u201316 (2005)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"37_CR24","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: AEGIS: architecture for tamper-evident and tamper-resistant processing. In: Proceedings of the 17th Annual International Conference on Supercomputing, ICS 2003, pp. 160\u2013171. ACM, New York (2003)","DOI":"10.1145\/782814.782838"},{"issue":"8","key":"37_CR25","first-page":"12","volume":"18","author":"MW Vanfleet","year":"2005","unstructured":"Vanfleet, M.W., Luke, J.A., Beckwith, W.R., Taylor, C., Calloni, B., Uchenick, G.: MILS: Architecture for High-Assurance Embedded Computing. CrossTalk: Journal of Defence. Software Engineering 18(8), 12\u201316 (2005)","journal-title":"Software Engineering"},{"key":"37_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-30921-2_10","volume-title":"Trust and Trustworthy Computing","author":"A Vasudevan","year":"2012","unstructured":"Vasudevan, A., Owusu, E., Zhou, Z., Newsome, J., McCune, J.M.: Trustworthy execution on mobile devices: what security properties can my mobile platform give Me? In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 159\u2013178. Springer, Heidelberg (2012)"},{"issue":"6","key":"37_CR27","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/MDT.2007.196","volume":"24","author":"P Wilson","year":"2007","unstructured":"Wilson, P., Frey, A., Mihm, T., Kershaw, D., Alves, T.: Implementing Embedded Security on Dual-Virtual-CPU Systems. IEEE Des. Test 24(6), 582\u2013591 (2007)","journal-title":"IEEE Des. Test"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18467-8_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T21:22:15Z","timestamp":1748380935000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-18467-8_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319184661","9783319184678"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18467-8_37","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}