{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:44:26Z","timestamp":1772041466471,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001445","name":"DSO National Laboratories - Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001445","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001459","name":"Ministry of Education - Singapore","doi-asserted-by":"publisher","award":["T1 251RES1314"],"award-info":[{"award-number":["T1 251RES1314"]}],"id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":["NRF2014NCR-NCR001-21"],"award-info":[{"award-number":["NRF2014NCR-NCR001-21"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2884781.2884817","type":"proceedings-article","created":{"date-parts":[[2016,5,13]],"date-time":"2016-05-13T18:21:10Z","timestamp":1463163670000},"page":"923-934","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Automated partitioning of android applications for trusted execution environments"],"prefix":"10.1145","author":[{"given":"Konstantin","family":"Rubinov","sequence":"first","affiliation":[{"name":"DeepSE Group at DEIB, Politecnico di Milano, Italy"}]},{"given":"Lucia","family":"Rosculete","sequence":"additional","affiliation":[{"name":"Application Threat Intelligence, Ixia, Romania"}]},{"given":"Tulika","family":"Mitra","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Abhik","family":"Roychoudhury","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android ndk toolset. https:\/\/developer.android.com\/ndk\/index.html.  Android ndk toolset. https:\/\/developer.android.com\/ndk\/index.html."},{"key":"e_1_3_2_1_2_1","unstructured":"card.io. https:\/\/www.card.io.  card.io. https:\/\/www.card.io."},{"key":"e_1_3_2_1_3_1","unstructured":"Global platform device specifications. http:\/\/www.globalplatform.org\/specificationsdevice.asp.  Global platform device specifications. http:\/\/www.globalplatform.org\/specificationsdevice.asp."},{"key":"e_1_3_2_1_4_1","unstructured":"Google authenticator. https:\/\/github.com\/google\/google-authenticator-android.  Google authenticator. https:\/\/github.com\/google\/google-authenticator-android."},{"key":"e_1_3_2_1_5_1","unstructured":"Hash it! http:\/\/android.ginkel.com\/.  Hash it! http:\/\/android.ginkel.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Microvison co. ltd. microvision mv4412 board. http:\/\/www.boardset.com\/products\/products v4412.php.  Microvison co. ltd. microvision mv4412 board. http:\/\/www.boardset.com\/products\/products v4412.php."},{"key":"e_1_3_2_1_7_1","unstructured":"Openkeychain. http:\/\/www.openkeychain.org\/.  Openkeychain. http:\/\/www.openkeychain.org\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Pixelknot. https:\/\/guardianproject.info\/apps\/pixelknot\/.  Pixelknot. https:\/\/guardianproject.info\/apps\/pixelknot\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Sierraware: Sierratee trusted execution environment. http:\/\/sierraware.com\/open-source-ARM-TrustZone.html.  Sierraware: Sierratee trusted execution environment. http:\/\/sierraware.com\/open-source-ARM-TrustZone.html."},{"key":"e_1_3_2_1_10_1","unstructured":"The MITRE Corporation: List of common vulnerabilities and exposures for all versions of Google Android. http:\/\/www.cvedetails.com\/product\/19997\/Google-Android.html?vendor\\_id=1224\/.  The MITRE Corporation: List of common vulnerabilities and exposures for all versions of Google Android. http:\/\/www.cvedetails.com\/product\/19997\/Google-Android.html?vendor\\_id=1224\/."},{"key":"e_1_3_2_1_11_1","volume-title":"July","author":"Device GlobalPlatform","year":"2010","unstructured":"GlobalPlatform Device Technology TEE Client API Specification Version 1.0 GPD SPE 007. Technical report , July 2010 . GlobalPlatform Device Technology TEE Client API Specification Version 1.0 GPD SPE 007. Technical report, July 2010."},{"key":"e_1_3_2_1_12_1","volume-title":"December","author":"Device GlobalPlatform","year":"2011","unstructured":"GlobalPlatform Device Technology TEE Internal API Specification Version 1.0 GPD SPE 010. Technical report , December 2011 . GlobalPlatform Device Technology TEE Internal API Specification Version 1.0 GPD SPE 010. Technical report, December 2011."},{"key":"e_1_3_2_1_13_1","volume-title":"December","author":"Device GlobalPlatform","year":"2011","unstructured":"GlobalPlatform Device Technology TEE System Architecture Version 1.0 GPD SPE 009. Technical report , December 2011 . GlobalPlatform Device Technology TEE System Architecture Version 1.0 GPD SPE 009. Technical report, December 2011."},{"key":"e_1_3_2_1_14_1","volume-title":"http:\/\/openauthentication.org\/specification","author":"Initiative","year":"2015","unstructured":"Initiative for open authentication. http:\/\/openauthentication.org\/specification , 2015 . Initiative for open authentication. http:\/\/openauthentication.org\/specification, 2015."},{"key":"e_1_3_2_1_15_1","first-page":"429","volume-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)","author":"Akhawe D.","year":"2012","unstructured":"D. Akhawe , P. Saxena , and D. Song . Privilege separation in html5 applications . In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12) , pages 429 -- 444 , Bellevue, WA , 2012 . USENIX. D. Akhawe, P. Saxena, and D. Song. Privilege separation in html5 applications. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12), pages 429--444, Bellevue, WA, 2012. USENIX."},{"key":"e_1_3_2_1_16_1","unstructured":"ARM. Arm security technology -- building a secure system using trustzone technology. arm technical white paper. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf 2009.  ARM. Arm security technology -- building a secure system using trustzone technology. arm technical white paper. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf 2009."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_3_2_1_18_1","unstructured":"D. Beer. Quirc. https:\/\/github.com\/dlbeer\/quirc\/.  D. Beer. Quirc. https:\/\/github.com\/dlbeer\/quirc\/."},{"key":"e_1_3_2_1_19_1","first-page":"57","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Brumley D.","year":"2004","unstructured":"D. Brumley and D. Song . Privtrans: Automatically partitioning programs for privilege separation . In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 , SSYM'04, pages 57 -- 72 , 2004 . D. Brumley and D. Song. Privtrans: Automatically partitioning programs for privilege separation. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM'04, pages 57--72, 2004."},{"key":"e_1_3_2_1_20_1","volume-title":"RFC Editor","author":"Callas J.","year":"2007","unstructured":"J. Callas , L. Donnerhacke , H. Finney , D. Shaw , and R. Thayer . RFC 4880: OpenPGP Message Format. Rfc 4880 , RFC Editor , November 2007 . J. Callas, L. Donnerhacke, H. Finney, D. Shaw, and R. Thayer. RFC 4880: OpenPGP Message Format. Rfc 4880, RFC Editor, November 2007."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350262"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294265"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516758"},{"key":"e_1_3_2_1_24_1","unstructured":"C. Fritz S. Arzt and S. Rasthofer. Droidbench test suite. http:\/\/sseblog.ec-spride.de\/tools\/droidbench\/.  C. Fritz S. Arzt and S. Rasthofer. Droidbench test suite. http:\/\/sseblog.ec-spride.de\/tools\/droidbench\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382214"},{"key":"e_1_3_2_1_27_1","volume-title":"Cetus Users and Compiler Infrastructure Workshop","author":"Lam P.","year":"2011","unstructured":"P. Lam , E. Bodden , O. Lhot\u00e1k , and L. Hendren . The Soot framework for Java program analysis: a retrospective . In Cetus Users and Compiler Infrastructure Workshop , Galveston Island, TX , October 2011 . P. Lam, E. Bodden, O. Lhot\u00e1k, and L. Hendren. The Soot framework for Java program analysis: a retrospective. In Cetus Users and Compiler Infrastructure Workshop, Galveston Island, TX, October 2011."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/138873.138874"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813690"},{"key":"e_1_3_2_1_30_1","unstructured":"B. Livshits. Securibench micro test suite. http:\/\/suif.stanford.edu\/~livshits\/work\/securibench-micro\/.  B. Livshits. Securibench micro test suite. http:\/\/suif.stanford.edu\/~livshits\/work\/securibench-micro\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516764"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23165"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199462"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541949"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37057-1_15"},{"key":"e_1_3_2_1_37_1","volume-title":"Jimple: Simplifying java bytecode for analyses and transformations. Technical report","author":"Vallee-Rai R.","year":"1998","unstructured":"R. Vallee-Rai and L. J. Hendren . Jimple: Simplifying java bytecode for analyses and transformations. Technical report , Sable Research Group , Mc Gill University , 1998 . R. Vallee-Rai and L. J. Hendren. Jimple: Simplifying java bytecode for analyses and transformations. Technical report, Sable Research Group, McGill University, 1998."},{"key":"e_1_3_2_1_38_1","first-page":"81","volume-title":"Proceedings of LISA '11: 25th Large Installation System Administration Conference","author":"van Rijswijk R. M.","year":"2011","unstructured":"R. M. van Rijswijk and J. van Dijk . tiqr : a novel take on two-factor authentication . In Proceedings of LISA '11: 25th Large Installation System Administration Conference , pages 81 -- 97 , Boston, MA , 2011 . USENIX Association. R. M. van Rijswijk and J. van Dijk. tiqr: a novel take on two-factor authentication. In Proceedings of LISA '11: 25th Large Installation System Administration Conference, pages 81--97, Boston, MA, 2011. USENIX Association."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2528251"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32298-3_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693091"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/566340.566343"}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","location":"Austin Texas","acronym":"ICSE '16","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\TCSE TC on Software Engineering","IEEE-CS\\DATC IEEE Computer Society"]},"container-title":["Proceedings of the 38th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2884781.2884817","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2884781.2884817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:06Z","timestamp":1750221546000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2884781.2884817"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":42,"alternative-id":["10.1145\/2884781.2884817","10.1145\/2884781"],"URL":"https:\/\/doi.org\/10.1145\/2884781.2884817","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}