{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T02:08:06Z","timestamp":1771726086968,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91118006"],"award-info":[{"award-number":["91118006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202414"],"award-info":[{"award-number":["61202414"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2013CB338003"],"award-info":[{"award-number":["2013CB338003"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2666141.2666145","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"25-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Providing Root of Trust for ARM TrustZone using On-Chip SRAM"],"prefix":"10.1145","author":[{"given":"Shijun","family":"Zhao","sequence":"first","affiliation":[{"name":"TCA Laboratory, ISCAS, Beijing, China"}]},{"given":"Qianying","family":"Zhang","sequence":"additional","affiliation":[{"name":"TCA Laboratory, ISCAS, Beijing, China"}]},{"given":"Guangyao","family":"Hu","sequence":"additional","affiliation":[{"name":"Beijing Vion Technology, Inc, Beijing, China"}]},{"given":"Yu","family":"Qin","sequence":"additional","affiliation":[{"name":"TCA Laboratory, ISCAS, Beijing, China"}]},{"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[{"name":"TCA Laboratory, ISCAS, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"App Sandbox Design Guide. https:\/\/developer.apple.com\/library\/mac\/documentation\/Security\/Conceptual\/AppSandboxDesignGuide\/AboutAppSandbox\/AboutAppSandbox.html.  App Sandbox Design Guide. https:\/\/developer.apple.com\/library\/mac\/documentation\/Security\/Conceptual\/AppSandboxDesignGuide\/AboutAppSandbox\/AboutAppSandbox.html."},{"key":"e_1_3_2_1_2_1","unstructured":"SE for Android. http:\/\/selinuxproject.org\/page\/SEforAndroid.  SE for Android. http:\/\/selinuxproject.org\/page\/SEforAndroid."},{"key":"e_1_3_2_1_3_1","unstructured":"Advanced Micro Devices. Secure Virtual Machine Architecture Reference Manual. AMD Publication (33047) 2005.  Advanced Micro Devices. Secure Virtual Machine Architecture Reference Manual. AMD Publication (33047) 2005."},{"key":"e_1_3_2_1_4_1","unstructured":"T. Alves and D. Felton. Trustzone: Integrated hardware and software security. ARM white paper 3(4) 2004.  T. Alves and D. Felton. Trustzone: Integrated hardware and software security. ARM white paper 3(4) 2004."},{"key":"e_1_3_2_1_5_1","unstructured":"Anne's fashion shoes. ALTERA EP2C8F256 Core Board. http:\/\/www.aliexpress.com\/item\/Altera-ep2c8f256-core-board-belt-sdram-sram-fpga-development-board-power-supply-pin\/1427214650.html.  Anne's fashion shoes. ALTERA EP2C8F256 Core Board. http:\/\/www.aliexpress.com\/item\/Altera-ep2c8f256-core-board-belt-sdram-sram-fpga-development-board-power-supply-pin\/1427214650.html."},{"key":"e_1_3_2_1_6_1","unstructured":"Apple. iOS Security. http:\/\/images.apple.com\/ipad\/business\/docs\/iOS_Security_Feb14.pdf.  Apple. iOS Security. http:\/\/images.apple.com\/ipad\/business\/docs\/iOS_Security_Feb14.pdf."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.255"},{"key":"e_1_3_2_1_8_1","unstructured":"ARM. ARM Security Technology Building a Secure System using TrustZone\\textsuperscript\u00ae Technology.  ARM. ARM Security Technology Building a Secure System using TrustZone\\textsuperscript\u00ae Technology."},{"key":"e_1_3_2_1_9_1","unstructured":"ARM. Designing with TrustZone\u00ae - Hardware Requirements.  ARM. Designing with TrustZone\u00ae - Hardware Requirements."},{"key":"e_1_3_2_1_10_1","unstructured":"ARM. Securing the System with TrustZone\u00ae Ready Program. http:\/\/www.arm.com\/products\/security-on-arm\/trustzone-ready\/index.php.  ARM. Securing the System with TrustZone\u00ae Ready Program. http:\/\/www.arm.com\/products\/security-on-arm\/trustzone-ready\/index.php."},{"key":"e_1_3_2_1_11_1","volume-title":"NIST","author":"Barker E. B.","year":"2007"},{"key":"e_1_3_2_1_12_1","unstructured":"A. Bellezza. Binary finite field library 0.02. http:\/\/www.beautylabs.net\/software\/finitefields.html.  A. Bellezza. Binary finite field library 0.02. http:\/\/www.beautylabs.net\/software\/finitefields.html."},{"key":"e_1_3_2_1_13_1","volume-title":"Ruhr-University Bochum","author":"B\u00f6sch C.","year":"2008"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_12"},{"key":"e_1_3_2_1_15_1","volume-title":"NDSS","author":"Claudio M.","year":"2014"},{"key":"e_1_3_2_1_16_1","unstructured":"A. Desnos and P. Lantz. Droidbox: An android application sandbox for dynamic analysis. https:\/\/code.google.com\/p\/droidbox\/ 2011.  A. Desnos and P. Lantz. Droidbox: An android application sandbox for dynamic analysis. https:\/\/code.google.com\/p\/droidbox\/ 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516653"},{"key":"e_1_3_2_1_18_1","first-page":"523","volume-title":"Advances in cryptology-Eurocrypt","author":"Dodis Y.","year":"2004"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046582.2046594"},{"key":"e_1_3_2_1_20_1","volume-title":"Nokia Research Center Helsinki","author":"Ekberg J.-E.","year":"2008"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38908-5_10"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/784592.784802"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"e_1_3_2_1_24_1","unstructured":"Global Platform Device Technology. TEE client API specification version 1.0. http:\/\/globalplatform.org 2010.  Global Platform Device Technology. TEE client API specification version 1.0. http:\/\/globalplatform.org 2010."},{"key":"e_1_3_2_1_25_1","unstructured":"GlobalPlatform. GlobalPlatform Device Specifications. http:\/\/www.globalplatform.org\/specificationsdevice.asp.  GlobalPlatform. GlobalPlatform Device Specifications. http:\/\/www.globalplatform.org\/specificationsdevice.asp."},{"key":"e_1_3_2_1_26_1","unstructured":"J. Gonz\u00e1lez. Open Virtualization for Xilinx's ZC-702. https:\/\/github.com\/javigon\/OpenVirtualization.  J. Gonz\u00e1lez. Open Virtualization for Xilinx's ZC-702. https:\/\/github.com\/javigon\/OpenVirtualization."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581556"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"e_1_3_2_1_31_1","unstructured":"Integrated Silicon Solution Inc. IS61LV6416--10TL. http:\/\/www.datasheet.com\/datasheet-pdf\/pdf\/505020\/ISSI\/IS61LV6416--10TL.html.  Integrated Silicon Solution Inc. IS61LV6416--10TL. http:\/\/www.datasheet.com\/datasheet-pdf\/pdf\/505020\/ISSI\/IS61LV6416--10TL.html."},{"key":"e_1_3_2_1_32_1","unstructured":"Intel Corporation. LaGrande technology preliminary architecture specification. Intel Publication (D52212) May 2006.  Intel Corporation. LaGrande technology preliminary architecture specification. Intel Publication (D52212) May 2006."},{"key":"e_1_3_2_1_33_1","unstructured":"P. C. Kocher. Leak-resistant cryptographic indexed key update Mar. 25 2003. US Patent 6 539 092.  P. C. Kocher. Leak-resistant cryptographic indexed key update Mar. 25 2003. US Patent 6 539 092."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533074"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559053"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225058"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/3-540-44887-X_47","volume-title":"Audio-and Video-Based Biometric Person Authentication","author":"Linnartz J.-P.","year":"2003"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5161248"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307670"},{"key":"e_1_3_2_1_40_1","volume-title":"3rd Benelux workshop on information and system security (WISSec 2008","volume":"17","author":"Maes R.","year":"2008"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_24"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1701116.1701250"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_18"},{"key":"e_1_3_2_1_44_1","unstructured":"K. Malbrain. Byte-Oriented-AES. https:\/\/code.google.com\/p\/byte-oriented-aes\/.  K. Malbrain. Byte-Oriented-AES. https:\/\/code.google.com\/p\/byte-oriented-aes\/."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357010.1352625"},{"issue":"2","key":"e_1_3_2_1_47_1","first-page":"544","article-title":"Trusted mobile devices: Requirements for a mobile trusted platform module","volume":"32","author":"McGill K. N.","year":"2013","journal-title":"JOHNS HOPKINS APL TECHNICAL DIGEST"},{"key":"e_1_3_2_1_48_1","unstructured":"R. Morelos-Zaragoza. Encoder\/decoder for binary BCH codes in C (Version 3.1). http:\/\/www.rajivchakravorty.com\/source-code\/uncertainty\/multimedia-sim\/html\/bch_8c-source.html.  R. Morelos-Zaragoza. Encoder\/decoder for binary BCH codes in C (Version 3.1). http:\/\/www.rajivchakravorty.com\/source-code\/uncertainty\/multimedia-sim\/html\/bch_8c-source.html."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.19"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"e_1_3_2_1_51_1","volume-title":"Massachusetts Institute of Technology","author":"Ravikanth P. S.","year":"2001"},{"key":"e_1_3_2_1_52_1","unstructured":"RSA Data Security Inc. RSAREF. http:\/\/www.homeport.org\/ adam\/crypto\/rsaref.phtml.  RSA Data Security Inc. RSAREF. http:\/\/www.homeport.org\/ adam\/crypto\/rsaref.phtml."},{"key":"e_1_3_2_1_53_1","volume-title":"DTIC Document","author":"Rukhin A.","year":"2001"},{"key":"e_1_3_2_1_54_1","unstructured":"L. Sanders. Secure Boot of Zynq-7000 All Programmable SoC. 2013.  L. Sanders. Secure Boot of Zynq-7000 All Programmable SoC. 2013."},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the 6th International Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OSPERT)","author":"Sangorrin D.","year":"2010"},{"key":"e_1_3_2_1_56_1","unstructured":"N. Santos H. Raj S. Saroiu and A. Wolman. Using arm trustzone to build a trusted language runtime for mobile applications.  N. Santos H. Raj S. Saroiu and A. Wolman. Using arm trustzone to build a trusted language runtime for mobile applications."},{"key":"e_1_3_2_1_57_1","unstructured":"Sierraware. Open Virtualization - ARM TrustZone and ARM Hypervisor Open Source Software. http:\/\/www.sierraware.com.  Sierraware. Open Virtualization - ARM TrustZone and ARM Hypervisor Open Source Software. http:\/\/www.sierraware.com."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224311"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68979-9_3"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"},{"key":"e_1_3_2_1_61_1","volume-title":"IEEE Spectrum","author":"Taylor G.","year":"2011"},{"key":"e_1_3_2_1_62_1","unstructured":"TCG. Trusted Platform Module Library Part 1: Architecture Family 2.0 Level 00 Revision 01.07 2014.  TCG. Trusted Platform Module Library Part 1: Architecture Family 2.0 Level 00 Revision 01.07 2014."},{"key":"e_1_3_2_1_63_1","unstructured":"Trusted Computing Group. http:\/\/www.trustedcomputinggroup.org.  Trusted Computing Group. http:\/\/www.trustedcomputinggroup.org."},{"key":"e_1_3_2_1_64_1","unstructured":"Trusted Computing Group. TPM Software Stack (TSS) Specification Version 1.2. https:\/\/www.trustedcomputinggroup.org\/resources\/tcg_software_stack_tss_specification.  Trusted Computing Group. TPM Software Stack (TSS) Specification Version 1.2. https:\/\/www.trustedcomputinggroup.org\/resources\/tcg_software_stack_tss_specification."},{"key":"e_1_3_2_1_65_1","unstructured":"TU Graz IAIK. jTSS--Java TCG Software Stack. http:\/\/trustedjava.sourceforge.net 2009.  TU Graz IAIK. jTSS--Java TCG Software Stack. http:\/\/trustedjava.sourceforge.net 2009."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_29"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_16"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/978-3-642-28368-0_20","volume-title":"Cryptography and Security: From Theory to Applications","author":"van der Leest V.","year":"2012"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.12"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.382012"},{"key":"e_1_3_2_1_71_1","unstructured":"Xilinx. Zynq-7000 All Programmable SoC ZC702 Evaluation Kit. http:\/\/www.xilinx.com\/products\/boards-and-kits\/EK-Z7-ZC702-G.htm.  Xilinx. Zynq-7000 All Programmable SoC ZC702 Evaluation Kit. http:\/\/www.xilinx.com\/products\/boards-and-kits\/EK-Z7-ZC702-G.htm."},{"key":"e_1_3_2_1_72_1","unstructured":"K. Yoder et al. TrouSerS--Open-source TCG Software Stack. http:\/\/trousers.sourceforge.net 2007.  K. Yoder et al. TrouSerS--Open-source TCG Software Stack. http:\/\/trousers.sourceforge.net 2007."}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","location":"Scottsdale Arizona USA","acronym":"CCS'14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 4th International Workshop on Trustworthy Embedded Devices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2666141.2666145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2666141.2666145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:24Z","timestamp":1750231164000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2666141.2666145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":72,"alternative-id":["10.1145\/2666141.2666145","10.1145\/2666141"],"URL":"https:\/\/doi.org\/10.1145\/2666141.2666145","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}