{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:11Z","timestamp":1773510911248,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. Office of Naval Research","award":["N00014-15-1-2012"],"award-info":[{"award-number":["N00014-15-1-2012"]}]},{"name":"U.S. Office of Naval Research","award":["N00014-15-1-2396"],"award-info":[{"award-number":["N00014-15-1-2396"]}]},{"name":"Strategy Pilot Project of Chinese Academy of Sciences","award":["XDA06010702"],"award-info":[{"award-number":["XDA06010702"]}]},{"name":"National 973 Program of China","award":["2013CB338001"],"award-info":[{"award-number":["2013CB338001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813692","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"976-988","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":80,"title":["TrustOTP"],"prefix":"10.1145","author":[{"given":"He","family":"Sun","sequence":"first","affiliation":[{"name":"College of William and Mary; Chinese Academy of Sciences, Williamsburg, VA, USA"}]},{"given":"Kun","family":"Sun","sequence":"additional","affiliation":[{"name":"College of William and Mary, Williamsburg, VA, USA"}]},{"given":"Yuewu","family":"Wang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jiwu","family":"Jing","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AMD Virtualization. http:\/\/www.amd.com\/en-us\/solutions\/servers\/virtualization.  AMD Virtualization. http:\/\/www.amd.com\/en-us\/solutions\/servers\/virtualization."},{"key":"e_1_3_2_1_2_1","unstructured":"Android OATH Token. https:\/\/code.google.com\/p\/androidtoken\/.  Android OATH Token. https:\/\/code.google.com\/p\/androidtoken\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Antutu Benchmark. http:\/\/www.antutu.com\/en\/Ranking.shtml.  Antutu Benchmark. http:\/\/www.antutu.com\/en\/Ranking.shtml."},{"key":"e_1_3_2_1_4_1","unstructured":"ARM. http:\/\/www.arm.com\/.  ARM. http:\/\/www.arm.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Booting the Android LXC container. https:\/\/wiki.ubuntu.com\/Touch\/ContainerArchitecture.  Booting the Android LXC container. https:\/\/wiki.ubuntu.com\/Touch\/ContainerArchitecture."},{"key":"e_1_3_2_1_6_1","unstructured":"DIGIPASS GO 6. https:\/\/www.vasco.com\/products\/client_products\/single_button_digipass\/digipass_go6.aspx.  DIGIPASS GO 6. https:\/\/www.vasco.com\/products\/client_products\/single_button_digipass\/digipass_go6.aspx."},{"key":"e_1_3_2_1_7_1","unstructured":"Juno ARM Development Platform. http:\/\/www.arm.com\/products\/tools\/development-boards\/versatile-express\/juno-arm-development-platform.php.  Juno ARM Development Platform. http:\/\/www.arm.com\/products\/tools\/development-boards\/versatile-express\/juno-arm-development-platform.php."},{"key":"e_1_3_2_1_8_1","unstructured":"OATH Compatible Hardware Tokens. http:\/\/www.rcdevs.com\/tokens\/?type=hardware.  OATH Compatible Hardware Tokens. http:\/\/www.rcdevs.com\/tokens\/?type=hardware."},{"key":"e_1_3_2_1_9_1","unstructured":"Phi phenomenon. http:\/\/en.wikipedia.org\/wiki\/Phi_phenomenon.  Phi phenomenon. http:\/\/en.wikipedia.org\/wiki\/Phi_phenomenon."},{"key":"e_1_3_2_1_10_1","unstructured":"RFC1760. https:\/\/tools.ietf.org\/html\/rfc1760.  RFC1760. https:\/\/tools.ietf.org\/html\/rfc1760."},{"key":"e_1_3_2_1_11_1","unstructured":"RFC2289. https:\/\/tools.ietf.org\/html\/rfc2289.  RFC2289. https:\/\/tools.ietf.org\/html\/rfc2289."},{"key":"e_1_3_2_1_12_1","unstructured":"RFC4226. https:\/\/tools.ietf.org\/html\/rfc4226.  RFC4226. https:\/\/tools.ietf.org\/html\/rfc4226."},{"key":"e_1_3_2_1_13_1","unstructured":"RFC6238. https:\/\/tools.ietf.org\/html\/rfc6238.  RFC6238. https:\/\/tools.ietf.org\/html\/rfc6238."},{"key":"e_1_3_2_1_14_1","unstructured":"Adeneo Embedded. Reference BSPs for Freescale i.MX53 Quick Start Board. http:\/\/www.adeneo-embedded.com\/en\/Products\/Board-Support-Packages\/Freescale-i.MX53-QSB.  Adeneo Embedded. Reference BSPs for Freescale i.MX53 Quick Start Board. http:\/\/www.adeneo-embedded.com\/en\/Products\/Board-Support-Packages\/Freescale-i.MX53-QSB."},{"key":"e_1_3_2_1_15_1","volume-title":"Trustzone: Integrated hardware and software security. ARM white paper, 3(4)","author":"Alves T.","year":"2004"},{"key":"e_1_3_2_1_16_1","first-page":"364","volume-title":"RV 2013, Rennes, France, September 24--27, 2013. Proceedings","author":"Arzt S."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_3_2_1_18_1","volume-title":"Texas Instruments Whitepaper","author":"Azema J.","year":"2008"},{"key":"e_1_3_2_1_19_1","unstructured":"O. Board. Origen exynos4 quad evaluation board. http:\/\/www.origenboard.org\/wiki\/index.php\/Introduction.  O. Board. Origen exynos4 quad evaluation board. http:\/\/www.origenboard.org\/wiki\/index.php\/Introduction."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541946"},{"issue":"4","key":"e_1_3_2_1_21_1","volume":"18","author":"Dmitrienko A.","year":"2014","journal-title":"Security analysis of mobile two-factor authentication schemes. Intel Technology Journal"},{"key":"e_1_3_2_1_22_1","unstructured":"P. Duc. Secure Mobile Payments - Protecting display data in TrustZone-enabled SoCs with the Evatronix PANTA Family of Display Processors. http:\/\/www.design-reuse.com\/articles\/30675.  P. Duc. Secure Mobile Payments - Protecting display data in TrustZone-enabled SoCs with the Evatronix PANTA Family of Display Processors. http:\/\/www.design-reuse.com\/articles\/30675."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516758"},{"key":"e_1_3_2_1_24_1","unstructured":"EMC$^2$. RSA SecureID Hardware Tokens. http:\/\/www.emc.com\/security\/rsa-securid\/rsa-securid-hardware-tokens.htm.  EMC$^2$. RSA SecureID Hardware Tokens. http:\/\/www.emc.com\/security\/rsa-securid\/rsa-securid-hardware-tokens.htm."},{"key":"e_1_3_2_1_25_1","unstructured":"Evatronix. Evatronix Launches Display Processor based on Latest ARM Security Technology. http:\/\/www.electronicsweekly.com\/noticeboard\/general\/evatronix-launches-display-processor-based-on-latest-arm-security-technology-2012-05\/.  Evatronix. Evatronix Launches Display Processor based on Latest ARM Security Technology. http:\/\/www.electronicsweekly.com\/noticeboard\/general\/evatronix-launches-display-processor-based-on-latest-arm-security-technology-2012-05\/."},{"key":"e_1_3_2_1_26_1","unstructured":"Fortinet. FortiToken. http:\/\/www.fortinet.com\/products\/fortitoken\/index.html.  Fortinet. FortiToken. http:\/\/www.fortinet.com\/products\/fortitoken\/index.html."},{"key":"e_1_3_2_1_27_1","unstructured":"Freescale. Hardware Reference Manual for i.MX53 Quick Start-R. http:\/\/cache.freescale.com\/files\/32bit\/doc\/ref_manual\/IMX53RQSBRM-R.pdf?fr=g.  Freescale. Hardware Reference Manual for i.MX53 Quick Start-R. http:\/\/cache.freescale.com\/files\/32bit\/doc\/ref_manual\/IMX53RQSBRM-R.pdf?fr=g."},{"key":"e_1_3_2_1_28_1","unstructured":"Freescale. i.MX 6Solo\/6DualLite Applications Processor Reference Manual. http:\/\/cache.freescale.com\/files\/32bit\/doc\/ref_manual\/IMX6SDLRM.pdf?fpsp=1&WT_TYPE=Reference%20Manuals&WT_VENDOR=FREESCALE&WT_FILE_FORMAT=pdf&WT_ASSET=Documentation.  Freescale. i.MX 6Solo\/6DualLite Applications Processor Reference Manual. http:\/\/cache.freescale.com\/files\/32bit\/doc\/ref_manual\/IMX6SDLRM.pdf?fpsp=1&WT_TYPE=Reference%20Manuals&WT_VENDOR=FREESCALE&WT_FILE_FORMAT=pdf&WT_ASSET=Documentation."},{"key":"e_1_3_2_1_29_1","unstructured":"Freescale. i.MX53 Processors. http:\/\/www.freescale.com\/webapp\/sps\/site\/taxonomy.jsp?code=IMX53_FAMILY.  Freescale. i.MX53 Processors. http:\/\/www.freescale.com\/webapp\/sps\/site\/taxonomy.jsp?code=IMX53_FAMILY."},{"key":"e_1_3_2_1_30_1","unstructured":"Freescale. i.MX53 Reference Manual with fusemap addendum. http:\/\/www.freescale.com\/webapp\/sps\/site\/prod_summary.jsp?code=i.MX537&fpsp=1&tab=Documentation_Tab.  Freescale. i.MX53 Reference Manual with fusemap addendum. http:\/\/www.freescale.com\/webapp\/sps\/site\/prod_summary.jsp?code=i.MX537&fpsp=1&tab=Documentation_Tab."},{"key":"e_1_3_2_1_31_1","unstructured":"Freescale. Imx53qsb: i.mx53 quick start board. http:\/\/www.freescale.com\/webapp\/sps\/site\/prod_summary.jsp?code=IMX53QSB&tid=vanIMXQUICKSTART.  Freescale. Imx53qsb: i.mx53 quick start board. http:\/\/www.freescale.com\/webapp\/sps\/site\/prod_summary.jsp?code=IMX53QSB&tid=vanIMXQUICKSTART."},{"key":"e_1_3_2_1_32_1","unstructured":"Freescale. On Board Diagnose Suit (OBDS). http:\/\/www.freescale.com\/webapp\/sps\/download\/license.jsp?colCode=IMX53QSBOBDS&location=null&fasp=1.  Freescale. On Board Diagnose Suit (OBDS). http:\/\/www.freescale.com\/webapp\/sps\/download\/license.jsp?colCode=IMX53QSBOBDS&location=null&fasp=1."},{"key":"e_1_3_2_1_33_1","unstructured":"Giesecke & Devrient. MobiCore. http:\/\/www.gi-de.com\/en\/trends_and_insights\/mobicore\/trusted-mobile-services.jsp.  Giesecke & Devrient. MobiCore. http:\/\/www.gi-de.com\/en\/trends_and_insights\/mobicore\/trusted-mobile-services.jsp."},{"key":"e_1_3_2_1_34_1","unstructured":"Google. Google Authenticator. http:\/\/en.wikipedia.org\/wiki\/Google_Authenticator.  Google. Google Authenticator. http:\/\/en.wikipedia.org\/wiki\/Google_Authenticator."},{"key":"e_1_3_2_1_35_1","volume-title":"Dec","author":"Worldwide Mobile Worker IDC.","year":"2011"},{"key":"e_1_3_2_1_36_1","unstructured":"Intel. Intel identity protection technology with one-time password. http:\/\/ipt.intel.com\/Home\/How-it-works\/network-security-identity-management\/ipt-with-one-time-password.  Intel. Intel identity protection technology with one-time password. http:\/\/ipt.intel.com\/Home\/How-it-works\/network-security-identity-management\/ipt-with-one-time-password."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23189"},{"key":"e_1_3_2_1_38_1","unstructured":"Jeff Carpenter EMC. Did You Know: Trends in RSA SecurID Two-Factor Authentication. http:\/\/www.emc.com\/collateral\/rsa\/eventpresentations\/04--10--12-Two-Factor_Auth.pdf.  Jeff Carpenter EMC. Did You Know: Trends in RSA SecurID Two-Factor Authentication. http:\/\/www.emc.com\/collateral\/rsa\/eventpresentations\/04--10--12-Two-Factor_Auth.pdf."},{"key":"e_1_3_2_1_39_1","volume-title":"Virtualization Dungeon on ARM. In Free and Open Source Software Developers' European Meeting, FOSDEM 2014","author":"Kalkowski S.","year":"2014"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533074"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742676"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23049"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23165"},{"key":"e_1_3_2_1_44_1","unstructured":"McAfee. Mcafee one time password. http:\/\/www.mcafee.com\/us\/products\/one-time-password.aspx.  McAfee. Mcafee one time password. http:\/\/www.mcafee.com\/us\/products\/one-time-password.aspx."},{"key":"e_1_3_2_1_45_1","unstructured":"Monsoon Solutions. Monsoon Power Monitor. https:\/\/www.msoon.com\/LabEquipment\/PowerMonitor\/.  Monsoon Solutions. Monsoon Power Monitor. https:\/\/www.msoon.com\/LabEquipment\/PowerMonitor\/."},{"key":"e_1_3_2_1_46_1","unstructured":"Open AuTHentication. OATH Toolkit. http:\/\/www.nongnu.org\/oath-toolkit\/.  Open AuTHentication. OATH Toolkit. http:\/\/www.nongnu.org\/oath-toolkit\/."},{"key":"e_1_3_2_1_47_1","unstructured":"Qualcomm Innovation Center. Vellamo Mobile Benchmark. https:\/\/play.google.com\/store\/apps\/details?id=com.quicinc.vellamo&hl=en.  Qualcomm Innovation Center. Vellamo Mobile Benchmark. https:\/\/play.google.com\/store\/apps\/details?id=com.quicinc.vellamo&hl=en."},{"key":"e_1_3_2_1_48_1","unstructured":"Samsung Electronics. White Paper: An Overview of Samsung KNOX. http:\/\/www.samsung.com\/global\/business\/business-images\/resource\/white-paper\/2013\/06\/Samsung_KNOX_whitepaper_June-0.pdf.  Samsung Electronics. White Paper: An Overview of Samsung KNOX. http:\/\/www.samsung.com\/global\/business\/business-images\/resource\/white-paper\/2013\/06\/Samsung_KNOX_whitepaper_June-0.pdf."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541949"},{"key":"e_1_3_2_1_50_1","unstructured":"SolidPass. Desktop soft token. http:\/\/www.solidpass.com\/authentication-methods\/one-time-password-generator-otp-token.html.  SolidPass. Desktop soft token. http:\/\/www.solidpass.com\/authentication-methods\/one-time-password-generator-otp-token.html."},{"key":"e_1_3_2_1_51_1","first-page":"202","volume-title":"Proceedings, Part I","author":"Sun H."},{"key":"e_1_3_2_1_52_1","unstructured":"Symantec. Whitepaper: Two-factor Authentication: A TCO Viewpoiont. https:\/\/www4.symantec.com\/mktginfo\/whitepaper\/user_authentication\/whitepaper-twofactor-authentication.pdf.  Symantec. Whitepaper: Two-factor Authentication: A TCO Viewpoiont. https:\/\/www4.symantec.com\/mktginfo\/whitepaper\/user_authentication\/whitepaper-twofactor-authentication.pdf."},{"key":"e_1_3_2_1_53_1","unstructured":"Trusted Logic. Trusted foundations by trusted logic mobility. http:\/\/www.arm.com\/community\/partners\/display_product\/rw\/ProductId\/5393\/.  Trusted Logic. Trusted foundations by trusted logic mobility. http:\/\/www.arm.com\/community\/partners\/display_product\/rw\/ProductId\/5393\/."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.163"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.157"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32298-3_1"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2011.6112330"},{"key":"e_1_3_2_1_58_1","unstructured":"Yubico. Yubikey. https:\/\/www.yubico.com\/.  Yubico. Yubikey. https:\/\/www.yubico.com\/."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813692","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813692"}},"subtitle":["Transforming Smartphones into Secure One-Time Password Tokens"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":58,"alternative-id":["10.1145\/2810103.2813692","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813692","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}