{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:15:02Z","timestamp":1774023302478,"version":"3.50.1"},"reference-count":83,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019814","name":"Fullgraf Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100019814","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833604","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T19:28:05Z","timestamp":1658950085000},"page":"352-369","source":"Crossref","is-referenced-by-count":45,"title":["RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone"],"prefix":"10.1109","author":[{"given":"Jinwen","family":"Wang","sequence":"first","affiliation":[{"name":"Washington University in St. Louis,MO,USA"}]},{"given":"Ao","family":"Li","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis,MO,USA"}]},{"given":"Haoran","family":"Li","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis,MO,USA"}]},{"given":"Chenyang","family":"Lu","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis,MO,USA"}]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis,MO,USA"}]}],"member":"263","reference":[{"key":"ref13","article-title":"M2MON: Building an mmio-based security reference monitor for unmanned vehicles","author":"khan","year":"2021","journal-title":"Proc USENIX Security07"},{"key":"ref57","article-title":"vtz: Virtualizing ARM trustzone","author":"hua","year":"2017","journal-title":"Proc USENIX Security07"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23107"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427262"},{"key":"ref15","year":"2009","journal-title":"ARM Security Technology Building A Secure System Using TrustZone Technology"},{"key":"ref59","article-title":"Minimal viable io drivers for trustzone","author":"guo","year":"2022","journal-title":"Eurosys"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00013"},{"key":"ref58","article-title":"CURE: A security architecture with customizable and resilient enclaves","author":"bahmani","year":"2021","journal-title":"Proc USENIX Security07"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23448"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.13"},{"key":"ref11","article-title":"ACES: Automatic compartments for embedded systems","author":"clements","year":"2018","journal-title":"Proc USENIX Security07"},{"key":"ref55","article-title":"Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base","author":"noorman","year":"2013","journal-title":"Proc USENIX Security07"},{"key":"ref10","article-title":"Holistic Control-Flow protection on Real-Time embedded systems with kage","author":"y d","year":"2022","journal-title":"Proc USENIX Security07"},{"key":"ref54","year":"0","journal-title":"Arm cca"},{"key":"ref17","article-title":"Sanctum: Minimal hardware extensions for strong software isolation","author":"costan","year":"2016","journal-title":"Proc USENIX Security07"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref19","article-title":"Shielding applications from an untrusted cloud with haven","author":"baumann","year":"2014","journal-title":"Proc of USENIX OSDI"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"ref51","year":"0","journal-title":"ArduPilot\/APM"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2015.7108436"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2005.25"},{"key":"ref45","article-title":"LTZVisor: Trustzone is the key","author":"pinto","year":"2017","journal-title":"ECRTS"},{"key":"ref48","year":"0","journal-title":"Navio2"},{"key":"ref47","year":"0","journal-title":"Trustzone implmentation in parrot bebop drone"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3079763"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942142"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2018.00012"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1967021.1967029"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS48715.2020.00013"},{"key":"ref8","year":"2021","journal-title":"Ftp system file access fulnerability on drone"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0158-4"},{"key":"ref9","year":"2021","journal-title":"Busybox cve-2017-16544"},{"key":"ref4","article-title":"Vulnerability analysis of ar. drone 2.0, an embedded linux system","author":"astaburuaga","year":"2019","journal-title":"CCWC"},{"key":"ref3","year":"0","journal-title":"ECU Consolidation Reduces Vehicle Cost Weight and Testing"},{"key":"ref6","year":"0","journal-title":"Hackers remotely kill a jeep on the highwaywith me in it"},{"key":"ref5","year":"2021","journal-title":"Mavlink vulnerability"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.36"},{"key":"ref81","year":"0","journal-title":"BCM2835 ARM Peripherals"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516678"},{"key":"ref83","article-title":"CLKSCREW: exposing the perils of security-oblivious energy management","author":"tang","year":"2017","journal-title":"Proc USENIX Security07"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484769"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"ref79","year":"0","journal-title":"Arc-sem"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190539"},{"key":"ref78","year":"0","journal-title":"Secureshield"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/321738.321743"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS46320.2019.00019"},{"key":"ref75","article-title":"Control-flow integrity for real-time embedded systems","author":"walls","year":"2019","journal-title":"ECRTS LIPIcs"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420960"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.37"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2010.10"},{"key":"ref77","year":"0","journal-title":"ARM CPUs"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485350"},{"key":"ref76","article-title":"PASAN: Detecting peripheral access concurrency bugs within bare-metal embedded applications","author":"kim","year":"2021","journal-title":"Proc USENIX Security07"},{"key":"ref2","article-title":"A smart way to drive ecu consolidation","author":"doll","year":"2015","journal-title":"WindRiver Tech Rep"},{"key":"ref1","year":"2019","journal-title":"How many millions of lines of code does it take?"},{"key":"ref39","article-title":"Amd memory encryption","author":"kaplan","year":"2016","journal-title":"White Paper"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2018.2853729"},{"key":"ref71","article-title":"SAVIOR: Securing autonomous vehicles with robust physical invariants","author":"quinonez","year":"2020","journal-title":"Proc USENIX Security07"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2019.8864566"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24016"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"ref24","year":"0","journal-title":"Nvidia TEE"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2038642.2038651"},{"key":"ref23","year":"0","journal-title":"Huawei tee"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363205"},{"key":"ref26","year":"0","journal-title":"Qualcomm tee"},{"key":"ref25","year":"0","journal-title":"Android trusty"},{"key":"ref69","article-title":"Virtualization on trustzone-enabled microcontrollers? voil&#x00E0;!","author":"pinto","year":"2019","journal-title":"RTAS"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"ref64","article-title":"Silhouette: Efficient protected shadow stacks for embedded systems","author":"zhou","year":"2020","journal-title":"Proc USENIX Security07"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23009"},{"key":"ref22","year":"0","journal-title":"Trusty tee"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00042"},{"key":"ref21","year":"0","journal-title":"Open portable trusted execution environment"},{"key":"ref65","article-title":"uXOM: Efficient execute-only memory on ARM cortex-m","author":"kwon","year":"2019","journal-title":"Proc USENIX Security07"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484782"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00084"},{"key":"ref29","article-title":"Ertos: Enclaves in real-time operating systems","author":"thomas","year":"2018","journal-title":"Woodstock"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24112"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210334"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.42"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833604.pdf?arnumber=9833604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:13:04Z","timestamp":1699485184000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833604\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":83,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833604","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}