{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T05:28:28Z","timestamp":1749619708629,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-SC0018430"],"award-info":[{"award-number":["DE-SC0018430"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545377","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"01-11","source":"Crossref","is-referenced-by-count":1,"title":["LightEMU: Hardware Assisted Fuzzing of Trusted Applications"],"prefix":"10.1109","author":[{"given":"Haoqi","family":"Shan","sequence":"first","affiliation":[{"name":"CertiK"}]},{"given":"Sravani","family":"Nissankararao","sequence":"additional","affiliation":[{"name":"University of New Hampshire"}]},{"given":"Yujia","family":"Liu","sequence":"additional","affiliation":[{"name":"Li Auto Inc."}]},{"given":"Moyao","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Shuo","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Yier","family":"Jin","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China"}]},{"given":"Dean","family":"Sullivan","sequence":"additional","affiliation":[{"name":"University of New Hampshire"}]}],"member":"263","reference":[{"volume-title":"Trustzone for cortex-a","key":"ref1"},{"volume-title":"Arm partners have shipped 200 billion chips","year":"2021","author":"Segars","key":"ref2"},{"key":"ref3","article-title":"Partemu: Enabling dynamic analysis of real-world trustzone software using emulation","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium","volume":"ser. SEC20","author":"Harrison"},{"key":"ref4","first-page":"220","article-title":"Teezz: Fuzzing trusted applications on cots android devices","volume-title":"2023 2023 IEEE Symposium on Security and Privacy (SP) (SP)","author":"Busch"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-023-00133-3"},{"volume-title":"System ip","author":"Ltd","key":"ref6"},{"key":"ref7","article-title":"AFL++: Combining incremental steps of fuzzing research","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Fioraldi","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2834476"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473932"},{"volume-title":"Trusted firmware - open source secure software","key":"ref10"},{"volume-title":"Coresight architecture","key":"ref11"},{"volume-title":"An introduction to access control on qualcomm snapdragon platforms","author":"Li","key":"ref12"},{"volume-title":"Executable and linkable format","year":"2021","key":"ref13"},{"volume-title":"musl libc","key":"ref14"},{"volume-title":"The ultimate disassembly framework","key":"ref15"},{"key":"ref16","first-page":"41","article-title":"Qemu, a fast and portable dynamic translator","volume-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference","volume":"ser. ATEC \u201805","author":"Bellard"},{"volume-title":"High-bandwidth digital content protection","year":"2022","key":"ref17"},{"volume-title":"Binary ninja","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"ref23","first-page":"1201","article-title":"HALucinator: Firmware re-hosting through abstraction layer emulation","volume-title":"29th USENIX Security Symposium (USENIX Sec20)","author":"Clements"},{"key":"ref24","first-page":"135","article-title":"Toward the analysis of embedded firmware through automated rehosting","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)","author":"Gustafson","year":"2019"},{"key":"ref25","first-page":"1237","article-title":"{ P21M }: Scalable and hardware-independent firmware testing via automatic peripheral interface modeling","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Feng","year":"2020"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2024,5,6]]},"location":"Tysons Corner, VA, USA","end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545377.pdf?arnumber=10545377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T04:17:51Z","timestamp":1717906671000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545377\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545377","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}