{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T22:28:29Z","timestamp":1749421709544},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/seconworkshops50264.2020.9149772","type":"proceedings-article","created":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T21:37:09Z","timestamp":1595972229000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Secure IoT Device Architecture Using TrustZone"],"prefix":"10.1109","author":[{"given":"Takayuki","family":"Sasaki","sequence":"first","affiliation":[]},{"given":"Koki","family":"Tomita","sequence":"additional","affiliation":[]},{"given":"Yuto","family":"Hayaki","sequence":"additional","affiliation":[]},{"given":"Seng Pei","family":"Liew","sequence":"additional","affiliation":[]},{"given":"Norio","family":"Yamagaki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3268935.3268939"},{"article-title":"The road to qualcomm trustzone apps fuzzing","year":"2019","author":"makkaveev","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.24"},{"key":"ref13","article-title":"Xenprobes, a lightweight user-space probing framework for xen virtual machine","author":"quynh","year":"2007","journal-title":"Proc USENIX Annual Technical Conference"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"article-title":"Arm&#x2019;s platform security architecture (psa) attestation token","year":"0","author":"tschofenig","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.134"},{"key":"ref17","article-title":"Control flow integrity for COTS binaries","author":"zhang","year":"2013","journal-title":"Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13)"},{"key":"ref18","article-title":"Truspy: Cache side-channel information leakage from the secure world on arm devices","author":"zhang","year":"2016","journal-title":"Report 2016\/980"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.50"},{"key":"ref3","article-title":"An introspection method of process memory with trusted opetation","author":"aoki","year":"2019","journal-title":"Proceedings of the Computer Security Symposium 2019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68979-9_2"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1145\/2660267.2660350","article-title":"Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world","author":"azab","year":"2014","journal-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1655108.1655117"},{"key":"ref7","article-title":"Intel sgx explained","author":"costan","year":"2016","journal-title":"Report 2016\/086"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"year":"0","key":"ref1","article-title":"Arm TrustZone"},{"article-title":"Sprobes: Enforcing kernel code integrity on the trustzone architecture","year":"2014","author":"ge","key":"ref9"}],"event":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","start":{"date-parts":[[2020,6,22]]},"location":"Como, Italy","end":{"date-parts":[[2020,6,26]]}},"container-title":["2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9143320\/9149768\/09149772.pdf?arnumber=9149772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:12:56Z","timestamp":1656601976000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9149772\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/seconworkshops50264.2020.9149772","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}