{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T18:57:52Z","timestamp":1768417072855,"version":"3.49.0"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Swedish Foundation for Strategic Research","award":["aSSIsT"],"award-info":[{"award-number":["aSSIsT"]}]},{"name":"Swedish Foundation for Strategic Research","award":["RISE KP"],"award-info":[{"award-number":["RISE KP"]}]},{"name":"H2020 VEDLIoT","award":["GA 957197"],"award-info":[{"award-number":["GA 957197"]}]},{"name":"H2020 CONCORDIA","award":["GA 830927"],"award-info":[{"award-number":["GA 830927"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2023,3,1]]},"DOI":"10.1109\/tdsc.2022.3147262","type":"journal-article","created":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T20:38:57Z","timestamp":1643747937000},"page":"1031-1047","source":"Crossref","is-referenced-by-count":5,"title":["ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stack"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5788-069X","authenticated-orcid":false,"given":"Anum","family":"Khurshid","sequence":"first","affiliation":[{"name":"Cybersecurity Unit, RISE Research Institutes of Sweden, Stockholm, Sweden"}]},{"given":"Sileshi Demesie","family":"Yalew","sequence":"additional","affiliation":[{"name":"Cybersecurity Unit, RISE Research Institutes of Sweden, Stockholm, Sweden"}]},{"given":"Mudassar","family":"Aslam","sequence":"additional","affiliation":[{"name":"Cybersecurity Unit, RISE Research Institutes of Sweden, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8192-0893","authenticated-orcid":false,"given":"Shahid","family":"Raza","sequence":"additional","affiliation":[{"name":"Cybersecurity Unit, RISE Research Institutes of Sweden, Stockholm, Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241275"},{"key":"ref2","article-title":"TrustZone technology for the ARMv8-M architecture","year":"2019"},{"key":"ref3","article-title":"ProvenCore-M","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23189"},{"key":"ref5","article-title":"Hardware-assisted DRM with ARM TrustZone on the Samsung GALAXY S III smartphone secured by discretix","year":"2012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23227"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945464"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"ref9","first-page":"841","article-title":"fTPM: A software-only implementation of a TPM chip","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Raj"},{"key":"ref10","article-title":"Innovative technology for CPU based attestation and sealing","volume-title":"Proc. 2nd Int. Workshop Hardware Architectural Support Secur. Privacy","author":"Anati"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"ref12","article-title":"ARM security technology, building a secure system using TrustZone technology","year":"2019"},{"key":"ref13","first-page":"541","article-title":"vTZ: Virtualizing ARM trustzone","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Hua"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.25"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3268935.3268939"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2858422"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866315"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2019.00032"},{"key":"ref20","article-title":"CoreLockr-TZ","year":"2017"},{"key":"ref21","article-title":"LTZVisor: Trustzone is the key","volume-title":"Proc. 29th Euromicro Conf. Real-Time Syst.","author":"Pinto"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2018.8433781"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400108"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2499368.2451146"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2644865.2541986"},{"key":"ref26","article-title":"ARMv8-M Memory Protection Unit","year":"2017"},{"key":"ref27","article-title":"Mbed uVisor","year":"2015"},{"key":"ref28","article-title":"TOCK","year":"2015"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3199610.3199617"},{"key":"ref30","first-page":"285","article-title":"M2MON: Building an MMIO-based security reference monitor for unmanned vehicles","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Khan"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277210"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23107"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24016"},{"key":"ref34","first-page":"231","article-title":"uXOM: Efficient execute-only memory on ARM Cortex-M","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Kwon"},{"key":"ref35","article-title":"ARMv8-M Architecture Reference Manual","year":"2019"},{"key":"ref36","article-title":"Using trustzone on armv8-m","year":"2019"},{"key":"ref37","article-title":"ARM Cortex-M33 Processor Technical Reference Manual","year":"2017"},{"key":"ref38","article-title":"ARMv8-M Fault Handling and Detection","year":"2017"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919760"},{"key":"ref41","article-title":"Platform security","year":"2019"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_12"},{"key":"ref43","article-title":"Trusted firmware-m documentation","year":"2021"},{"key":"ref44","article-title":"ARM platform security architecture overview","year":"2018"},{"key":"ref45","article-title":"Arm Musca-A Test Chip and Board Technical Reference Manual","year":"2018"},{"key":"ref46","article-title":"RTOS Design Considerations for ARMv8-M based Platforms","year":"2016"},{"key":"ref47","article-title":"Verifying RISC-V physical memory protection","volume-title":"Proc. IEEE Int. Symp. Perform. Anal. Syst. Softw. Workshop Sec. RISC-V Archit. Des.","author":"Cheang"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10068314\/09699026.pdf?arnumber=9699026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:27:00Z","timestamp":1705534020000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9699026\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,1]]},"references-count":46,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2022.3147262","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,1]]}}}