{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:31Z","timestamp":1750306231397,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T00:00:00Z","timestamp":1470268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,4]]},"DOI":"10.1145\/2967360.2967380","type":"proceedings-article","created":{"date-parts":[[2016,8,8]],"date-time":"2016-08-08T13:10:51Z","timestamp":1470661851000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Smart and Secure"],"prefix":"10.1145","author":[{"given":"Seung-seob","family":"Lee","sequence":"first","affiliation":[{"name":"Yonsei University and Microsoft Research"}]},{"given":"Hang","family":"Shi","sequence":"additional","affiliation":[{"name":"Tsinghua University and Microsoft Research"}]},{"given":"Kun","family":"Tan","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Yunxin","family":"Liu","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"SuKyoung","family":"Lee","sequence":"additional","affiliation":[{"name":"Yonsei University"}]},{"given":"Yong","family":"Cui","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]}],"member":"320","published-online":{"date-parts":[[2016,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"360\n    smart home router. http:\/\/luyou.360.cn\/.  360 smart home router. http:\/\/luyou.360.cn\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Almond and Almond+ smart home routers. https:\/\/www.securifi.com\/.  Almond and Almond+ smart home routers. https:\/\/www.securifi.com\/."},{"key":"e_1_3_2_1_3_1","volume-title":"ARM Technical White Paper","author":"Security ARM","year":"2005","unstructured":"ARM Security Technology -- Building a Secure System using TrustZone Technology . ARM Technical White Paper , 2005 -2009. ARM Security Technology -- Building a Secure System using TrustZone Technology. ARM Technical White Paper, 2005-2009."},{"key":"e_1_3_2_1_4_1","volume-title":"Nov.","author":"Getting Started Guide AWS","year":"2013","unstructured":"AWS CloudHSM Getting Started Guide . Amazon Web Services , Nov. 2013 . http:\/\/aws.amazon.com\/cloudhsm\/. AWS CloudHSM Getting Started Guide. Amazon Web Services, Nov. 2013. http:\/\/aws.amazon.com\/cloudhsm\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Consumers Want Simple Online Protection. https:\/\/nominum.com\/news-events\/survey-shows-consumers-want-simpler-online-protection-from-internet-service-providers\/.  Consumers Want Simple Online Protection. https:\/\/nominum.com\/news-events\/survey-shows-consumers-want-simpler-online-protection-from-internet-service-providers\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Freescale SABRE Lite i.MX 6Quad development board. http:\/\/www.element14.com\/iMX6.  Freescale SABRE Lite i.MX 6Quad development board. http:\/\/www.element14.com\/iMX6."},{"key":"e_1_3_2_1_7_1","unstructured":"FuturePlus System. DDR2 800 bus analysis probe. http:\/\/www.futureplus.com\/download\/datasheet\/fs2334_ds.pdf.  FuturePlus System. DDR2 800 bus analysis probe. http:\/\/www.futureplus.com\/download\/datasheet\/fs2334_ds.pdf."},{"key":"e_1_3_2_1_8_1","unstructured":"Genode Operating System Framework. https:\/\/genode.org\/.  Genode Operating System Framework. https:\/\/genode.org\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Genode Porting Guide: Overview. https:\/\/genode.org\/documentation\/developer-resources\/porting.  Genode Porting Guide: Overview. https:\/\/genode.org\/documentation\/developer-resources\/porting."},{"key":"e_1_3_2_1_10_1","unstructured":"Google OnHub smart home router. https:\/\/on.google.com\/hub\/.  Google OnHub smart home router. https:\/\/on.google.com\/hub\/."},{"key":"e_1_3_2_1_11_1","unstructured":"HiWiFi smart home router. http:\/\/www.hiwifi.com\/.  HiWiFi smart home router. http:\/\/www.hiwifi.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Large-scale attack hijacks your router though your browser. http:\/\/www.pcworld.com\/article\/2926312\/large-scale-attack-hijacks-routers-through-users-browsers.html\/.  Large-scale attack hijacks your router though your browser. http:\/\/www.pcworld.com\/article\/2926312\/large-scale-attack-hijacks-routers-through-users-browsers.html\/."},{"key":"e_1_3_2_1_13_1","unstructured":"OpenSSL Cryptography and SSL\/TLS Toolkit. https:\/\/www.openssl.org\/.  OpenSSL Cryptography and SSL\/TLS Toolkit. https:\/\/www.openssl.org\/."},{"key":"e_1_3_2_1_14_1","unstructured":"OpenWrt. https:\/\/openwrt.org\/.  OpenWrt. https:\/\/openwrt.org\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Router Bugs Flaws Hacks and Vulnerabilities. http:\/\/routersecurity.org\/bugs.php.  Router Bugs Flaws Hacks and Vulnerabilities. http:\/\/routersecurity.org\/bugs.php."},{"key":"e_1_3_2_1_16_1","unstructured":"Secure Block Device Library. https:\/\/github.com\/IAIK\/secure-block-device.  Secure Block Device Library. https:\/\/github.com\/IAIK\/secure-block-device."},{"key":"e_1_3_2_1_17_1","unstructured":"Software Guard Extensions Programming Reference. Intel Corp. Sept. 2013. Ref. #329298-001.  Software Guard Extensions Programming Reference. Intel Corp. Sept. 2013. Ref. #329298-001."},{"key":"e_1_3_2_1_18_1","first-page":"329298","author":"Extensions Programming Reference Software Guard","year":"2014","unstructured":"Software Guard Extensions Programming Reference , Rev. 2. Intel Corp. , Oct. 2014 . Ref. # 329298 - 329002 . Software Guard Extensions Programming Reference, Rev. 2. Intel Corp., Oct. 2014. Ref. #329298-002.","journal-title":"Rev. 2. Intel Corp."},{"key":"e_1_3_2_1_19_1","volume-title":"Mar.","author":"Main Specification TPM","year":"2011","unstructured":"TPM Main Specification Level 2. Trusted Computing Group , Mar. 2011 . Version 1.2, Revision 116. TPM Main Specification Level 2. Trusted Computing Group, Mar. 2011. Version 1.2, Revision 116."},{"key":"e_1_3_2_1_20_1","unstructured":"Transport Layer Security (TLS) Extensions RFC 3546. https:\/\/www.ietf.org\/rfc\/rfc3546.txt.  Transport Layer Security (TLS) Extensions RFC 3546. https:\/\/www.ietf.org\/rfc\/rfc3546.txt."},{"key":"e_1_3_2_1_21_1","unstructured":"Xiaomi MiWiFi smart home router. http:\/\/www.mi.com\/miwifi\/ (in Chinese).  Xiaomi MiWiFi smart home router. http:\/\/www.mi.com\/miwifi\/ (in Chinese)."},{"key":"e_1_3_2_1_22_1","unstructured":"The Trusted Computing Platform Alliance 2003. https:\/\/www.trustedpc.com.  The Trusted Computing Platform Alliance 2003. https:\/\/www.trustedpc.com."},{"key":"e_1_3_2_1_23_1","volume-title":"Innovative Technology for CPU Based Attestation and Sealing. In 2nd International Workshop on Hardware and Architectural Support for Security and Privacy","author":"Anati I.","year":"2013","unstructured":"I. Anati , S. Gueron , S. P. Johnson , and V. R. Scarlata . Innovative Technology for CPU Based Attestation and Sealing. In 2nd International Workshop on Hardware and Architectural Support for Security and Privacy , 2013 . I. Anati, S. Gueron, S. P. Johnson, and V. R. Scarlata. Innovative Technology for CPU Based Attestation and Sealing. In 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 2013."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685070"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490301.2451145"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2893177"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945463"},{"key":"e_1_3_2_1_28_1","volume-title":"IETF Secretariat","author":"Loreto S.","year":"2014","unstructured":"S. Loreto , J. Mattsson , R. Skog , H. Spaak , G. Gus , D. Druta , and M. Hafeez . Explicit Trusted Proxy in HTTP\/2.0. Internet-Draft draft-loreto-httpbis-trusted-proxy20-01 . IETF Secretariat , 2014 . S. Loreto, J. Mattsson, R. Skog, H. Spaak, G. Gus, D. Druta, and M. Hafeez. Explicit Trusted Proxy in HTTP\/2.0. Internet-Draft draft-loreto-httpbis-trusted-proxy20-01. IETF Secretariat, 2014."},{"key":"e_1_3_2_1_29_1","volume-title":"IETF Secretariat","author":"McGrew D.","year":"2012","unstructured":"D. McGrew , D. Wing , Y. Nir , and P. Gladstone . TLS Proxy Server Extension. Internet-Draft draft-mcgrew-tls-proxy-server-01 . IETF Secretariat , 2012 . D. McGrew, D. Wing, Y. Nir, and P. Gladstone. TLS Proxy Server Extension. Internet-Draft draft-mcgrew-tls-proxy-server-01. IETF Secretariat, 2012."},{"volume-title":"Microsoft Application Virtualization (App-V)","year":"2006","key":"e_1_3_2_1_30_1","unstructured":"Microsoft. Microsoft Application Virtualization (App-V) . Redmond, WA , 2006 . Microsoft. Microsoft Application Virtualization (App-V). Redmond, WA, 2006."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787482"},{"key":"e_1_3_2_1_32_1","volume-title":"Trusted computing platforms: TCPA technology in context","author":"Pearson S.","year":"2003","unstructured":"S. Pearson and B. Balacheff . Trusted computing platforms: TCPA technology in context . Prentice Hall Professional , 2003 . S. Pearson and B. Balacheff. Trusted computing platforms: TCPA technology in context. Prentice Hall Professional, 2003."},{"key":"e_1_3_2_1_33_1","volume-title":"IETF Secretariat","author":"Peon R.","year":"2012","unstructured":"R. Peon . Explicit Proxy in HTTP\/2.0. Internet-Draft draft-rpeon-httpbis-exproxy-00 . IETF Secretariat , 2012 . R. Peon. Explicit Proxy in HTTP\/2.0. Internet-Draft draft-rpeon-httpbis-exproxy-00. IETF Secretariat, 2012."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950399"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/324119.324128"}],"event":{"name":"APSys '16: 7th ACM SIGOPS Asia-Pacific Workshop on Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Hong Kong Hong Kong","acronym":"APSys '16"},"container-title":["Proceedings of the 7th ACM SIGOPS Asia-Pacific Workshop on Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2967360.2967380","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2967360.2967380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:13Z","timestamp":1750220593000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2967360.2967380"}},"subtitle":["Preserving Privacy in Untrusted Home Routers"],"short-title":[],"issued":{"date-parts":[[2016,8,4]]},"references-count":35,"alternative-id":["10.1145\/2967360.2967380","10.1145\/2967360"],"URL":"https:\/\/doi.org\/10.1145\/2967360.2967380","relation":{},"subject":[],"published":{"date-parts":[[2016,8,4]]},"assertion":[{"value":"2016-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}