{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:42Z","timestamp":1772164062748,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,2,24]],"date-time":"2014-02-24T00:00:00Z","timestamp":1393200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,2,24]]},"DOI":"10.1145\/2541940.2541949","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T08:21:11Z","timestamp":1393316471000},"page":"67-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":123,"title":["Using ARM trustzone to build a trusted language runtime for mobile applications"],"prefix":"10.1145","author":[{"given":"Nuno","family":"Santos","sequence":"first","affiliation":[{"name":"INESC-ID \/ Instituto Superior Tecnico, University of Lisbon, Lisbon, Portugal"}]},{"given":"Himanshu","family":"Raj","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Stefan","family":"Saroiu","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Alec","family":"Wolman","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,2,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android. http:\/\/www.android.com.  Android. http:\/\/www.android.com."},{"key":"e_1_3_2_1_2_1","unstructured":"Dalvik VM Internals. https:\/\/sites.google.com\/site\/io\/dalvik-vm-internals.  Dalvik VM Internals. https:\/\/sites.google.com\/site\/io\/dalvik-vm-internals."},{"key":"e_1_3_2_1_3_1","unstructured":"Apple iOS 6. http:\/\/www.apple.com\/ios.  Apple iOS 6. http:\/\/www.apple.com\/ios."},{"key":"e_1_3_2_1_4_1","unstructured":"Mono. http:\/\/www.mono-project.com\/Main_Page\/.  Mono. http:\/\/www.mono-project.com\/Main_Page\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Common Language Runtime (CLR) . http:\/\/msdn.microsoft.com\/en-us\/library\/8bs2ecf4.aspx.  Common Language Runtime (CLR) . http:\/\/msdn.microsoft.com\/en-us\/library\/8bs2ecf4.aspx."},{"key":"e_1_3_2_1_6_1","unstructured":".NET Micro Framework . http:\/\/www.microsoft.com\/netmf\/default.mspx.  .NET Micro Framework . http:\/\/www.microsoft.com\/netmf\/default.mspx."},{"key":"e_1_3_2_1_7_1","unstructured":"Proxama. http:\/\/www.proxama.com\/products-and-services\/trustzone.  Proxama. http:\/\/www.proxama.com\/products-and-services\/trustzone."},{"key":"e_1_3_2_1_8_1","unstructured":"Transaction authentication number. http:\/\/www.wikipedia.org\/wiki\/Transaction_authentication_number.  Transaction authentication number. http:\/\/www.wikipedia.org\/wiki\/Transaction_authentication_number."},{"key":"e_1_3_2_1_9_1","unstructured":"Tegra 250 Dev Board. https:\/\/developer.nvidia.com\/tegra-250-development-board-features\/.  Tegra 250 Dev Board. https:\/\/developer.nvidia.com\/tegra-250-development-board-features\/."},{"key":"e_1_3_2_1_10_1","unstructured":"U-boot Bootloader. http:\/\/www.denx.de\/en\/News\/WebHome\/.  U-boot Bootloader. http:\/\/www.denx.de\/en\/News\/WebHome\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Microsoft Windows 8. http:\/\/windows.microsoft.com\/en-us\/windows-8\/meet.  Microsoft Windows 8. http:\/\/windows.microsoft.com\/en-us\/windows-8\/meet."},{"key":"e_1_3_2_1_12_1","volume-title":"Microsoft Technical White Paper","author":"Porting","year":"2007","unstructured":"Porting the . NET Micro Framework . Microsoft Technical White Paper , 2007 . http:\/\/msdn.microsoft.com\/en-us\/netframework\/bb267253.aspx. Porting the .NET Micro Framework. Microsoft Technical White Paper, 2007. http:\/\/msdn.microsoft.com\/en-us\/netframework\/bb267253.aspx."},{"key":"e_1_3_2_1_13_1","unstructured":"Understanding .NET Micro Framework Architecture 2010. http:\/\/msdn.microsoft.com\/en-us\/library\/cc533001.aspx.  Understanding .NET Micro Framework Architecture 2010. http:\/\/msdn.microsoft.com\/en-us\/library\/cc533001.aspx."},{"key":"e_1_3_2_1_14_1","volume-title":"ARM Technical White Paper","author":"ARM.","year":"2009","unstructured":"ARM. ARMSecurity Technology -- Building a Secure System using TrustZone Technology . ARM Technical White Paper , 2009 . http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf. ARM. ARMSecurity Technology -- Building a Secure System using TrustZone Technology. ARM Technical White Paper, 2009. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046752"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of USENIX Security --04","author":"Brumley D.","year":"2004","unstructured":"D. Brumley and D. Song . Privtrans: automatically partitioning programs for privilege separation . In Proc. of USENIX Security --04 , 2004 . D. Brumley and D. Song. Privtrans: automatically partitioning programs for privilege separation. In Proc. of USENIX Security --04, 2004."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294265"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc of OSDI'10","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones . In Proc of OSDI'10 , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proc of OSDI'10, 2010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_22_1","first-page":"130","author":"T. C. Group","year":"2006","unstructured":"T. C. Group . TPM Main Specification Level 2 Version 1.2 , Revision 130 , 2006 . T. C. Group. TPM Main Specification Level 2 Version 1.2, Revision 130, 2006.","journal-title":"Revision"},{"key":"e_1_3_2_1_23_1","volume-title":"CollaborateCom","author":"H\u00e4rtig H.","year":"2005","unstructured":"H. H\u00e4rtig , M. Hohmuth , N. Feske , C. Helmuth , A. Lackorzynski , F. Mehnert , and M. Peter . The Nizza Secure-System Architecture . CollaborateCom , 2005 . H. H\u00e4rtig,M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert, and M. Peter. The Nizza Secure-System Architecture. CollaborateCom, 2005."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1106-70"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533074"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307670"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.38"},{"key":"e_1_3_2_1_32_1","unstructured":"PrivacyCA. PrivacyCA. http:\/\/privacyca.com.  PrivacyCA. PrivacyCA. http:\/\/privacyca.com."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184495"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755935"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. of OSDI","author":"Ta-Min R.","year":"2006","unstructured":"R. Ta-Min , L. Litty , and D. Lie . Splitting Interfaces: Making Trust Between Applications and Operating Systems Congurable . In Proc. of OSDI , 2006 . R. Ta-Min, L. Litty, and D. Lie. Splitting Interfaces: Making Trust Between Applications and Operating Systems Congurable. In Proc. of OSDI, 2006."},{"key":"e_1_3_2_1_38_1","unstructured":"V. Tsai. eMMC v4.41 and v4.5. http:\/\/www.jedec.org\/sites\/default\/files\/Victor_Tsai.pdf  V. Tsai. eMMC v4.41 and v4.5. http:\/\/www.jedec.org\/sites\/default\/files\/Victor_Tsai.pdf"}],"event":{"name":"ASPLOS '14: Architectural Support for Programming Languages and Operating Systems","location":"Salt Lake City Utah USA","acronym":"ASPLOS '14","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 19th international conference on Architectural support for programming languages and operating systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2541940.2541949","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2541940.2541949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:27Z","timestamp":1750219827000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2541940.2541949"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,24]]},"references-count":38,"alternative-id":["10.1145\/2541940.2541949","10.1145\/2541940"],"URL":"https:\/\/doi.org\/10.1145\/2541940.2541949","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2644865.2541949","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/2654822.2541949","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2014,2,24]]},"assertion":[{"value":"2014-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}