{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:38:34Z","timestamp":1730209114985,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,3]]},"DOI":"10.1109\/cns56114.2022.9947233","type":"proceedings-article","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T20:49:54Z","timestamp":1668804594000},"page":"100-108","source":"Crossref","is-referenced-by-count":1,"title":["GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone"],"prefix":"10.1109","author":[{"given":"Balachandar","family":"Gowrisankar","sequence":"first","affiliation":[{"name":"National University of Singapore"}]},{"given":"Daisuke","family":"Mashima","sequence":"additional","affiliation":[{"name":"Illinois at Singapore Pte Ltd"}]},{"given":"Wenshei","family":"Ong","sequence":"additional","affiliation":[{"name":"Illinois at Singapore Pte Ltd"}]},{"given":"Quanqi","family":"Ye","sequence":"additional","affiliation":[{"name":"Illinois at Singapore Pte Ltd"}]},{"given":"Ertem","family":"Esiner","sequence":"additional","affiliation":[{"name":"Illinois at Singapore Pte Ltd"}]},{"given":"Binbin","family":"Chen","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design"}]},{"given":"Zbigniew","family":"Kalbarczyk","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign"}]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2622261"},{"journal-title":"Samsung KNOX","year":"0","key":"ref10"},{"key":"ref11","first-page":"26","article-title":"Qsee trustzone kernel integer over flow vulnerability","author":"rosenberg","year":"2014","journal-title":"Black Hat Conference"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref13","article-title":"Reflections on Trusting Trustzone","author":"rosenberg","year":"2014","journal-title":"Black Hat USA"},{"key":"ref14","article-title":"Rustzone: Writing Trusted Applications in Rust","author":"evenchick","year":"2018","journal-title":"Black Hat Asia"},{"journal-title":"EMUI 8 0 Security Technical White Paper","year":"2017","key":"ref15"},{"key":"ref16","article-title":"Exploiting trustzone on android","author":"shen","year":"2015","journal-title":"Black Hat USA"},{"key":"ref17","article-title":"Security issues with ARM TrustZone","author":"grygoriev","year":"2018","journal-title":"TESTING STAGE"},{"journal-title":"Position paper On using trusted execution environment to secure cots devices for accessing industrial control systems","year":"2021","author":"ye","key":"ref18"},{"journal-title":"Open portable trusted execution environment","year":"0","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210338"},{"journal-title":"TEE Protection Profile Version 1 2 1","year":"2016","key":"ref4"},{"journal-title":"Emedded TLS Library","year":"0","key":"ref27"},{"journal-title":"Introducing arm trustzone","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3156897"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2014.13"},{"key":"ref5","first-page":"1","volume":"10","author":"esiner","year":"2019","journal-title":"F-pro a fast and flexible provenance-aware message authentication scheme for smart grid"},{"journal-title":"Trustonic Secured Platforms (TSP) The industry's most com-plete device security solution","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796767"},{"journal-title":"Tee System Architecture Version 1 0","year":"2018","key":"ref2"},{"journal-title":"Kinibi tee Trusted application exploitation","year":"0","author":"berard","key":"ref9"},{"journal-title":"Introduction to Trusted Execution Environment ARM's Trustzone","year":"2018","author":"guilbon","key":"ref1"},{"journal-title":"SierraTEE for ARM&#x00AE;Trustzone&#x00AE;and MIPS","year":"0","key":"ref20"},{"key":"ref22","first-page":"1","article-title":"Attacking trustzone on devices lacking memory protection","author":"stajnrod","year":"2021","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"journal-title":"ARM1176JZ-S Technical Reference Manual","year":"2019","key":"ref21"},{"journal-title":"QEMU-the FAST! Processor Emulator","year":"0","key":"ref24"},{"journal-title":"OP-TEE Documentation","year":"2022","key":"ref23"},{"journal-title":"REE-FS TA binary formats","year":"0","key":"ref26"},{"journal-title":"Qemu v7","year":"0","key":"ref25"}],"event":{"name":"2022 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2022,10,3]]},"location":"Austin, TX, USA","end":{"date-parts":[[2022,10,5]]}},"container-title":["2022 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9947203\/9947223\/09947233.pdf?arnumber=9947233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:56:55Z","timestamp":1670875015000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9947233\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cns56114.2022.9947233","relation":{},"subject":[],"published":{"date-parts":[[2022,10,3]]}}}