{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:45:11Z","timestamp":1773193511914,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:00:00Z","timestamp":1497571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-13-1-0421 (MURI)"],"award-info":[{"award-number":["W911NF-13-1-0421 (MURI)"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1422594, CNS-1505664, CNS-1634441, CNS-1422355, CNS-1408880, SBE-1422215"],"award-info":[{"award-number":["CNS-1422594, CNS-1505664, CNS-1634441, CNS-1422355, CNS-1408880, SBE-1422215"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,16]]},"DOI":"10.1145\/3081333.3081349","type":"proceedings-article","created":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T18:24:43Z","timestamp":1497637483000},"page":"488-501","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":100,"title":["TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone"],"prefix":"10.1145","author":[{"given":"Le","family":"Guan","sequence":"first","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Xinyu","family":"Xing","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Xinyang","family":"Ge","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Shengzhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Florida Institute of Technology, Melbourne, FL, USA"}]},{"given":"Meng","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache Software Foundation. Apache HTTP server benchmarking tool. http:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html.  Apache Software Foundation. Apache HTTP server benchmarking tool. http:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html."},{"key":"e_1_3_2_1_2_1","volume-title":"Virtualization Extensions Architecture Specification","author":"ARM Architecture Group","year":"2010","unstructured":"ARM Architecture Group . Virtualization Extensions Architecture Specification , 2010 . https:\/\/www.arm.com\/products\/processors\/technologies\/virtualization-extensions.php. ARM Architecture Group. Virtualization Extensions Architecture Specification, 2010. https:\/\/www.arm.com\/products\/processors\/technologies\/virtualization-extensions.php."},{"key":"e_1_3_2_1_3_1","volume-title":"ARMv8-M Architecture Simplifies Security for Smart Embedded Devices","author":"ARM Architecture Group","year":"2015","unstructured":"ARM Architecture Group . ARMv8-M Architecture Simplifies Security for Smart Embedded Devices , 2015 . https:\/\/www.arm.com\/about\/newsroom\/armv8-m-architecture-simplifies-security-for-smart-embedded-devices.php. ARM Architecture Group. ARMv8-M Architecture Simplifies Security for Smart Embedded Devices, 2015. https:\/\/www.arm.com\/about\/newsroom\/armv8-m-architecture-simplifies-security-for-smart-embedded-devices.php."},{"key":"e_1_3_2_1_4_1","volume-title":"Security technology building a secure system using trustzone technology (white paper)","author":"Ltd ARM","year":"2009","unstructured":"ARM Ltd . Security technology building a secure system using trustzone technology (white paper) . 2009 . ARM Ltd. Security technology building a secure system using trustzone technology (white paper). 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_3_2_1_6_1","first-page":"267","volume-title":"OSDI'14","author":"Baumann A.","year":"2014","unstructured":"A. Baumann , M. Peinado , and G. Hunt . Shielding applications from an untrusted cloud with haven . In OSDI'14 , 2014 , pages 267 -- 283 , Broomfield, CO , Oct. 2014. USENIX Association . A. Baumann, M. Peinado, and G. Hunt. Shielding applications from an untrusted cloud with haven. In OSDI'14, 2014, pages 267--283, Broomfield, CO, Oct. 2014. USENIX Association."},{"key":"e_1_3_2_1_7_1","volume-title":"6th Annual CanSecWest Conference","author":"Becher M.","year":"2005","unstructured":"M. Becher , M. Dornseif , and C. Klein . Firewire: All your memory are belong to us . In 6th Annual CanSecWest Conference , 2005 . M. Becher, M. Dornseif, and C. Klein. Firewire: All your memory are belong to us. In 6th Annual CanSecWest Conference, 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-319-05029-4_7","volume-title":"Big Data and Internet of Things: A Roadmap for Smart Environments","author":"Bonomi F.","year":"2014","unstructured":"F. Bonomi , R. Milito , P. Natarajan , and J. Zhu . Fog computing: A platform for internet of things and analytics . In Big Data and Internet of Things: A Roadmap for Smart Environments , pages 169 -- 186 . Springer , 2014 . F. Bonomi, R. Milito, P. Natarajan, and J. Zhu. Fog computing: A platform for internet of things and analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments, pages 169--186. Springer, 2014."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451145"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694380"},{"key":"e_1_3_2_1_15_1","volume-title":"Fog-assisted wiot: A smart fog gateway for end-to-end analytics in wearable internet of things. CoRR, abs\/1701.08680","author":"Constant N.","year":"2017","unstructured":"N. Constant , D. Borthakur , M. Abtahi , H. Dubey , and K. Mankodiya . Fog-assisted wiot: A smart fog gateway for end-to-end analytics in wearable internet of things. CoRR, abs\/1701.08680 , 2017 . N. Constant, D. Borthakur, M. Abtahi, H. Dubey, and K. Mankodiya. Fog-assisted wiot: A smart fog gateway for end-to-end analytics in wearable internet of things. CoRR, abs\/1701.08680, 2017."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541986"},{"key":"e_1_3_2_1_17_1","unstructured":"CVEdetails.com. Vmware: Vulnerability statistics. http:\/\/www.cvedetails.com\/vendor\/252\/Vmware.html.  CVEdetails.com. Vmware: Vulnerability statistics. http:\/\/www.cvedetails.com\/vendor\/252\/Vmware.html."},{"key":"e_1_3_2_1_18_1","unstructured":"CVEdetails.com. Xen: Vulnerability statistics. http:\/\/www.cvedetails.com\/vendor\/6276\/XEN.html.  CVEdetails.com. Xen: Vulnerability statistics. http:\/\/www.cvedetails.com\/vendor\/6276\/XEN.html."},{"key":"e_1_3_2_1_19_1","unstructured":"Eric Brown. First linux-based 3d printers hit the market. http:\/\/hackerboards.com\/first-linux-based-3d-printers-hit-the-market\/.  Eric Brown. First linux-based 3d printers hit the market. http:\/\/hackerboards.com\/first-linux-based-3d-printers-hit-the-market\/."},{"key":"e_1_3_2_1_20_1","volume-title":"Why you don't necessarily need a hypervisor","author":"Baum Felix","year":"2014","unstructured":"Felix Baum . Why you don't necessarily need a hypervisor , 2014 . http:\/\/embedded-computing.com\/guest-blogs\/why-you-dont-necessarily-need-a-hypervisor\/. Felix Baum. Why you don't necessarily need a hypervisor, 2014. http:\/\/embedded-computing.com\/guest-blogs\/why-you-dont-necessarily-need-a-hypervisor\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_22_1","volume-title":"Sprobes: Enforcing kernel code integrity on the trustzone architecture","author":"Ge X.","year":"2014","unstructured":"X. Ge , H. Vijayakumar , and T. Jaeger . Sprobes: Enforcing kernel code integrity on the trustzone architecture . 2014 . X. Ge, H. Vijayakumar, and T. Jaeger. Sprobes: Enforcing kernel code integrity on the trustzone architecture. 2014."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2007.912030"},{"key":"e_1_3_2_1_24_1","volume-title":"Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures. In The 37th IEEE Symposium on Security and Privacy (S&P), SAN JOSE, CA, May 23--25","author":"Guanciale R.","year":"2016","unstructured":"R. Guanciale , H. Nemati , C. Baumann , and M. Dam . Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures. In The 37th IEEE Symposium on Security and Privacy (S&P), SAN JOSE, CA, May 23--25 2016 . IEEE. R. Guanciale, H. Nemati, C. Baumann, and M. Dam. Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures. In The 37th IEEE Symposium on Security and Privacy (S&P), SAN JOSE, CA, May 23--25 2016. IEEE."},{"key":"e_1_3_2_1_25_1","first-page":"45","volume-title":"Lest We Remember: Cold Boot Attacks on Encryption Keys. In 17th USENIX Security Symposium","author":"Halderman J.","year":"2008","unstructured":"J. Halderman , S. Schoen , N. Heninger , W. Clarkson , W. Paul , J. Calandrino , A. Feldman , J. Appelbaum , and E. Felten . Lest We Remember: Cold Boot Attacks on Encryption Keys. In 17th USENIX Security Symposium , pages 45 -- 60 , 2008 . J. Halderman, S. Schoen, N. Heninger, W. Clarkson, W. Paul, J. Calandrino, A. Feldman, J. Appelbaum, and E. Felten. Lest We Remember: Cold Boot Attacks on Encryption Keys. In 17th USENIX Security Symposium, pages 45--60, 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451146"},{"key":"e_1_3_2_1_27_1","volume-title":"Annual ShmooCon Convention","author":"Hulton D.","year":"2006","unstructured":"D. Hulton . Cardbus bus-mastering : 0wning the laptop . In Annual ShmooCon Convention , 2006 . D. Hulton. Cardbus bus-mastering: 0wning the laptop. In Annual ShmooCon Convention, 2006."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1577069.1755843"},{"key":"e_1_3_2_1_29_1","volume-title":"A System Performance Benchmark","author":"Kopytov. SysBench A.","year":"2004","unstructured":"A. Kopytov. SysBench : A System Performance Benchmark , 2004 . https:\/\/github.com\/akopytov\/sysbench. A. Kopytov. SysBench: A System Performance Benchmark, 2004. https:\/\/github.com\/akopytov\/sysbench."},{"key":"e_1_3_2_1_30_1","volume-title":"The mnist database of handwritten digits","author":"LeCun Y.","year":"1998","unstructured":"Y. LeCun , C. Cortes , and C. J. Burges . The mnist database of handwritten digits , 1998 . http:\/\/yann.lecun.com\/exdb\/mnist\/. Y. LeCun, C. Cortes, and C. J. Burges. The mnist database of handwritten digits, 1998. http:\/\/yann.lecun.com\/exdb\/mnist\/."},{"key":"e_1_3_2_1_31_1","first-page":"549","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Lipp M.","year":"2016","unstructured":"M. Lipp , D. Gruss , R. Spreitzer , C. Maurice , and S. Mangard . Armageddon: Cache attacks on mobile devices . In 25th USENIX Security Symposium (USENIX Security 16) , pages 549 -- 564 , Austin, TX , Aug. 2016 . USENIX Association. M. Lipp, D. Gruss, R. Spreitzer, C. Maurice, and S. Mangard. Armageddon: Cache attacks on mobile devices. In 25th USENIX Security Symposium (USENIX Security 16), pages 549--564, Austin, TX, Aug. 2016. USENIX Association."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2565585.2565591"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357010.1352625"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_36_1","first-page":"23","volume-title":"Proceedings of the 1996 Annual Conference on USENIX Annual Technical Conference, ATEC '96","author":"McVoy L.","year":"1996","unstructured":"L. McVoy and C. Staelin . Lmbench: Portable tools for performance analysis . In Proceedings of the 1996 Annual Conference on USENIX Annual Technical Conference, ATEC '96 , pages 23 -- 23 , Berkeley, CA, USA , 1996 . USENIX Association. L. McVoy and C. Staelin. Lmbench: Portable tools for performance analysis. In Proceedings of the 1996 Annual Conference on USENIX Annual Technical Conference, ATEC '96, pages 23--23, Berkeley, CA, USA, 1996. USENIX Association."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_23"},{"key":"e_1_3_2_1_38_1","unstructured":"Samsung Electronics. The KNOX Workspace Technical Details. https:\/\/www.samsungknox.com\/en\/products\/knox-workspace\/technical.  Samsung Electronics. The KNOX Workspace Technical Details. https:\/\/www.samsungknox.com\/en\/products\/knox-workspace\/technical."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541949"},{"key":"e_1_3_2_1_40_1","unstructured":"P. Schwabe. Eliminating Timing Side-Channels. A Tutorial 2015.  P. Schwabe. Eliminating Timing Side-Channels. A Tutorial 2015."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2008.923410"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813692"},{"key":"e_1_3_2_1_43_1","first-page":"279","volume-title":"OSDI'06, 2006","author":"Ta-Min R.","year":"2006","unstructured":"R. Ta-Min , L. Litty , and D. Lie . Splitting interfaces: Making trust between applications and operating systems configurable . In OSDI'06, 2006 , pages 279 -- 292 . USENIX Association , 2006 . R. Ta-Min, L. Litty, and D. Lie. Splitting interfaces: Making trust between applications and operating systems configurable. In OSDI'06, 2006, pages 279--292. USENIX Association, 2006."},{"key":"e_1_3_2_1_44_1","unstructured":"Wolfgang Denk. Das U-Boot -- the Universal Boot Loader. http:\/\/www.denx.de\/wiki\/U-Boot\/WebHome.  Wolfgang Denk. Das U-Boot -- the Universal Boot Loader. http:\/\/www.denx.de\/wiki\/U-Boot\/WebHome."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346267"},{"key":"e_1_3_2_1_47_1","first-page":"719","volume-title":"Low Noise, L3 Cache Side-Channel Attack. In USENIX Security'14","author":"Yarom Y.","year":"2014","unstructured":"Y. Yarom and K. Falkner . FLUSH+RELOAD: A High Resolution , Low Noise, L3 Cache Side-Channel Attack. In USENIX Security'14 , 2014 , pages 719 -- 732 , San Diego, CA , Aug. 2014. USENIX Association . Y. Yarom and K. Falkner. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In USENIX Security'14, 2014, pages 719--732, San Diego, CA, Aug. 2014. USENIX Association."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.13"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"}],"event":{"name":"MobiSys'17: The 15th Annual International Conference on Mobile Systems, Applications, and Services","location":"Niagara Falls New York USA","acronym":"MobiSys'17","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3081333.3081349","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3081333.3081349","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3081333.3081349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:00Z","timestamp":1750217820000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3081333.3081349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,16]]},"references-count":48,"alternative-id":["10.1145\/3081333.3081349","10.1145\/3081333"],"URL":"https:\/\/doi.org\/10.1145\/3081333.3081349","relation":{},"subject":[],"published":{"date-parts":[[2017,6,16]]},"assertion":[{"value":"2017-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}