{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T01:05:08Z","timestamp":1773277508067,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,10]],"date-time":"2018-06-10T00:00:00Z","timestamp":1528588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010663","name":"European Research Council","doi-asserted-by":"publisher","award":["Synergy imPACT 610150"],"award-info":[{"award-number":["Synergy imPACT 610150"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1526635 and CNS 1314857"],"award-info":[{"award-number":["CNS 1526635 and CNS 1314857"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,10]]},"DOI":"10.1145\/3210240.3210334","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T12:36:06Z","timestamp":1530880566000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["SeCloak"],"prefix":"10.1145","author":[{"given":"Matthew","family":"Lentz","sequence":"first","affiliation":[{"name":"University of Maryland"}]},{"given":"Rijurekha","family":"Sen","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Software Systems"}]},{"given":"Peter","family":"Druschel","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Software Systems"}]},{"given":"Bobby","family":"Bhattacharjee","sequence":"additional","affiliation":[{"name":"University of Maryland"}]}],"member":"320","published-online":{"date-parts":[[2018,6,10]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"AMD. AMD64 Architecture Programmer's Manual Volume 2: System Programming. https:\/\/support.amd.com\/TechDocs\/24593.pdf.  AMD. AMD64 Architecture Programmer's Manual Volume 2: System Programming. https:\/\/support.amd.com\/TechDocs\/24593.pdf."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1983.1654439"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081346"},{"key":"e_1_3_2_2_4_1","unstructured":"ARM. ARM Power State Coordination Interface. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.den0022d\/Power_State_Coordination_Interface_PDD_v1_1_DEN0022D.pdf.  ARM. ARM Power State Coordination Interface. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.den0022d\/Power_State_Coordination_Interface_PDD_v1_1_DEN0022D.pdf."},{"key":"e_1_3_2_2_5_1","unstructured":"ARM. ARM Trustzone. https:\/\/www.arm.com\/products\/security-on-arm\/trustzone.  ARM. ARM Trustzone. https:\/\/www.arm.com\/products\/security-on-arm\/trustzone."},{"key":"e_1_3_2_2_6_1","unstructured":"ARM. Cortex-A Series Programmer's Guide Version: 4.0. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.den0013d\/index.html.  ARM. Cortex-A Series Programmer's Guide Version: 4.0. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.den0013d\/index.html."},{"key":"e_1_3_2_2_7_1","volume-title":"Boxify: Full-fledged App Sandboxing for Stock Android. In USENIX Security Symposium.","author":"Backes Michael","year":"2015","unstructured":"Michael Backes , Sven Bugiel , Christian Hammer , Oliver Schranz , and Philipp von Styp-Rekowsky . 2015 . Boxify: Full-fledged App Sandboxing for Stock Android. In USENIX Security Symposium. Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, and Philipp von Styp-Rekowsky. 2015. Boxify: Full-fledged App Sandboxing for Stock Android. In USENIX Security Symposium."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_39"},{"key":"e_1_3_2_2_9_1","volume-title":"An Android Application Sandbox System for Suspicious Software Detection. In IEEE International Conference on Malicious and Unwanted Software (MALWARE).","author":"Bl\u00e4sing Thomas","year":"2010","unstructured":"Thomas Bl\u00e4sing , Leonid Batyuk , Aubrey-Derrick Schmidt , Seyit Ahmet Camtepe , and Sahin Albayrak . 2010 . An Android Application Sandbox System for Suspicious Software Detection. In IEEE International Conference on Malicious and Unwanted Software (MALWARE). Thomas Bl\u00e4sing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Camtepe, and Sahin Albayrak. 2010. An Android Application Sandbox System for Suspicious Software Detection. In IEEE International Conference on Malicious and Unwanted Software (MALWARE)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906390"},{"key":"e_1_3_2_2_11_1","unstructured":"Ashley Carman. Sex Toy Company Admits to Recording Users' Remote Sex Sessions Calls it a 'Minor Bug'. https:\/\/www.theverge.com\/2017\/11\/10\/16634442\/lovense-sex-toy-spy-surveillance.  Ashley Carman. Sex Toy Company Admits to Recording Users' Remote Sex Sessions Calls it a 'Minor Bug'. https:\/\/www.theverge.com\/2017\/11\/10\/16634442\/lovense-sex-toy-spy-surveillance."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353534.1346284"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505123"},{"key":"e_1_3_2_2_14_1","volume-title":"Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices. In USENIX Annual Technical Conference. 565--578","author":"Cho Yeongpil","year":"2016","unstructured":"Yeongpil Cho , Jun-Bum Shin , Donghyun Kwon , MyungJoo Ham , Yuna Kim , and Yunheung Paek . 2016 . Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices. In USENIX Annual Technical Conference. 565--578 . Yeongpil Cho, Jun-Bum Shin, Donghyun Kwon, MyungJoo Ham, Yuna Kim, and Yunheung Paek. 2016. Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices. In USENIX Annual Technical Conference. 565--578."},{"key":"e_1_3_2_2_15_1","volume-title":"CRePE: Context-Related Policy Enforcement for Android. In International Conference on Information Security (ISC)","volume":"10","author":"Conti Mauro","year":"2010","unstructured":"Mauro Conti , Vu Thien Nga Nguyen , and Bruno Crispo . 2010 . CRePE: Context-Related Policy Enforcement for Android. In International Conference on Information Security (ISC) , Vol. 10 . 331--345. Mauro Conti, Vu Thien Nga Nguyen, and Bruno Crispo. 2010. CRePE: Context-Related Policy Enforcement for Android. In International Conference on Information Security (ISC), Vol. 10. 331--345."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084041.3084066"},{"key":"e_1_3_2_2_17_1","unstructured":"Anthony Cuthbertson. Are Hackers Spying on Your Baby? http:\/\/www.newsweek.com\/search-engine-sleeping-babies-420967.  Anthony Cuthbertson. Are Hackers Spying on Your Baby? http:\/\/www.newsweek.com\/search-engine-sleeping-babies-420967."},{"key":"e_1_3_2_2_18_1","unstructured":"devicetree.org. Devicetree Specification Release 0.1. https:\/\/www.devicetree.org\/downloads\/devicetree-specification-v0.1-20160524.pdf.  devicetree.org. Devicetree Specification Release 0.1. https:\/\/www.devicetree.org\/downloads\/devicetree-specification-v0.1-20160524.pdf."},{"key":"e_1_3_2_2_19_1","volume-title":"QUIRE: Lightweight Provenance for Smart Phone Operating Systems. In USENIX Security Symposium.","author":"Dietz Michael","year":"2011","unstructured":"Michael Dietz , Shashi Shekhar , Yuliy Pisetsky , Anhei Shu , and Dan S Wallach . 2011 . QUIRE: Lightweight Provenance for Smart Phone Operating Systems. In USENIX Security Symposium. Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan S Wallach. 2011. QUIRE: Lightweight Provenance for Smart Phone Operating Systems. In USENIX Security Symposium."},{"key":"e_1_3_2_2_20_1","volume-title":"Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. In USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Dunn Alan M","year":"2012","unstructured":"Alan M Dunn , Michael Z Lee , Suman Jana , Sangman Kim , Mark Silberstein , Yuanzhong Xu , Vitaly Shmatikov , and Emmett Witchel . 2012 . Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). Alan M Dunn, Michael Z Lee, Suman Jana, Sangman Kim, Mark Silberstein, Yuanzhong Xu, Vitaly Shmatikov, and Emmett Witchel. 2012. Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. In USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_2_21_1","volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Egele Manuel","year":"2011","unstructured":"Manuel Egele , Christopher Kruegel , Engin Kirda , and Giovanni Vigna . 2011 . PiOS: Detecting Privacy Leaks in iOS Applications . In Network and Distributed System Security Symposium (NDSS). Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_2_22_1","unstructured":"DENX Software Engineering. Das U-Boot -- The Universal Boot Loader. https:\/\/www.denx.de\/wiki\/U-Boot.  DENX Software Engineering. Das U-Boot -- The Universal Boot Loader. https:\/\/www.denx.de\/wiki\/U-Boot."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132782"},{"key":"e_1_3_2_2_24_1","unstructured":"freedesktop.org. polkit. https:\/\/www.freedesktop.org\/wiki\/Software\/polkit\/.  freedesktop.org. polkit. https:\/\/www.freedesktop.org\/wiki\/Software\/polkit\/."},{"key":"e_1_3_2_2_25_1","unstructured":"Viral Gandhi. Are Mobile Apps a Leaky Tap in the Enterprise? https:\/\/www.zscaler.com\/blogs\/research\/are-mobile-apps-leaky-tap-enterprise.  Viral Gandhi. Are Mobile Apps a Leaky Tap in the Enterprise? https:\/\/www.zscaler.com\/blogs\/research\/are-mobile-apps-leaky-tap-enterprise."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081349"},{"key":"e_1_3_2_2_28_1","volume-title":"AMIA Annual Symposium","volume":"2014","author":"He Dongjing","year":"2014","unstructured":"Dongjing He , Muhammad Naveed , Carl A Gunter , and Klara Nahrstedt . 2014 . Security Concerns in Android mHealth Apps . In AMIA Annual Symposium , Vol. 2014 . 645. Dongjing He, Muhammad Naveed, Carl A Gunter, and Klara Nahrstedt. 2014. Security Concerns in Android mHealth Apps. In AMIA Annual Symposium, Vol. 2014. 645."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490301.2451146"},{"key":"e_1_3_2_2_30_1","unstructured":"Intel. Intel SGX Homepage. https:\/\/software.intel.com\/en-us\/sgx.  Intel. Intel SGX Homepage. https:\/\/software.intel.com\/en-us\/sgx."},{"key":"e_1_3_2_2_31_1","unstructured":"Intel. Intel Trusted Execution Technology. https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/white-papers\/trusted-execution-technology-security-paper.pdf.  Intel. Intel Trusted Execution Technology. https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/white-papers\/trusted-execution-technology-security-paper.pdf."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63834"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872372"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637166.2637225"},{"key":"e_1_3_2_2_35_1","unstructured":"Linaro. OP-TEE Home. https:\/\/www.op-tee.org\/.  Linaro. OP-TEE Home. https:\/\/www.op-tee.org\/."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307670"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3086439.3086443"},{"key":"e_1_3_2_2_38_1","unstructured":"Jack Loftus. Dear Fitbit Users Kudos On the 30 Minutes of \"Vigorous Sexual Activity\" Last Night. https:\/\/gizmodo.com\/5817784\/dear-fitbit-users-kudos-on-the-30-minutes-of-vigorous-sexual-activity-last-night.  Jack Loftus. Dear Fitbit Users Kudos On the 30 Minutes of \"Vigorous Sexual Activity\" Last Night. https:\/\/gizmodo.com\/5817784\/dear-fitbit-users-kudos-on-the-30-minutes-of-vigorous-sexual-activity-last-night."},{"key":"e_1_3_2_2_39_1","volume-title":"USENIX Annual Technical Conference.","author":"Loscocco Peter","year":"2001","unstructured":"Peter Loscocco and Stephen Smalley . 2001 . Integrating Flexible Support for Security Policies into the Linux Operating System . In USENIX Annual Technical Conference. Peter Loscocco and Stephen Smalley. 2001. Integrating Flexible Support for Security Policies into the Linux Operating System. In USENIX Annual Technical Conference."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_2_42_1","volume-title":"USENIX Security Symposium.","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky , Dan Boneh , and Gabi Nakibly . 2014 . Gyrophone: Recognizing Speech from Gyroscope Signals . In USENIX Security Symposium. Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals. In USENIX Security Symposium."},{"key":"e_1_3_2_2_43_1","volume-title":"PowerSpy: Location Tracking Using Mobile Device Power Analysis. In USENIX Security Symposium.","author":"Michalevsky Yan","year":"2015","unstructured":"Yan Michalevsky , Aaron Schulman , Gunaa Arumugam Veerapandian , Dan Boneh , and Gabi Nakibly . 2015 . PowerSpy: Location Tracking Using Mobile Device Power Analysis. In USENIX Security Symposium. Yan Michalevsky, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh, and Gabi Nakibly. 2015. PowerSpy: Location Tracking Using Mobile Device Power Analysis. In USENIX Security Symposium."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906391"},{"key":"e_1_3_2_2_45_1","volume-title":"Linux Security Modules: General Security Support for the Linux Kernel. In USENIX Security Symposium.","author":"Morris James","year":"2002","unstructured":"James Morris , Stephen Smalley , and Greg Kroah-Hartman . 2002 . Linux Security Modules: General Security Support for the Linux Kernel. In USENIX Security Symposium. James Morris, Stephen Smalley, and Greg Kroah-Hartman. 2002. Linux Security Modules: General Security Support for the Linux Kernel. In USENIX Security Symposium."},{"key":"e_1_3_2_2_46_1","volume-title":"Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues. JMIR mHealth and uHealth 5, 10","author":"M\u00fcthing Jannis","year":"2017","unstructured":"Jannis M\u00fcthing , Thomas J\u00e4schke , and Christoph M Friedrich . 2017. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues. JMIR mHealth and uHealth 5, 10 ( 2017 ). Jannis M\u00fcthing, Thomas J\u00e4schke, and Christoph M Friedrich. 2017. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues. JMIR mHealth and uHealth 5, 10 (2017)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_2_48_1","volume-title":"Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani, and Edgar Weippl.","author":"Neuner Sebastian","year":"2014","unstructured":"Sebastian Neuner , Victor Van der Veen , Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani, and Edgar Weippl. 2014 . Enter Sandbox : Android Sandbox Comparison . arXiv preprint arXiv:1410.7749 (2014). Sebastian Neuner, Victor Van der Veen, Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani, and Edgar Weippl. 2014. Enter Sandbox: Android Sandbox Comparison. arXiv preprint arXiv:1410.7749 (2014)."},{"key":"e_1_3_2_2_49_1","unstructured":"NXP. i.MX 6 Series Applications Processors. https:\/\/www.nxp.com\/products\/microcontrollers-and-processors\/arm-based-processors-and-mcus\/i.mx-applications-processors\/i.mx-6-processors:IMX6X_SERIES.  NXP. i.MX 6 Series Applications Processors. https:\/\/www.nxp.com\/products\/microcontrollers-and-processors\/arm-based-processors-and-mcus\/i.mx-applications-processors\/i.mx-6-processors:IMX6X_SERIES."},{"key":"e_1_3_2_2_50_1","unstructured":"Charles Orton-Jones. Beware Household Gadgets That Can Take Control and 'Spy' on You. https:\/\/www.raconteur.net\/technology\/beware-household-gadgets-that-can-take-control-and-spy-on-you.  Charles Orton-Jones. Beware Household Gadgets That Can Take Control and 'Spy' on You. https:\/\/www.raconteur.net\/technology\/beware-household-gadgets-that-can-take-control-and-spy-on-you."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_2_52_1","unstructured":"Zoltan Pallagi. WiFi Speed Test - Android Apps on Google Play. https:\/\/play.google.com\/store\/apps\/details?id=com.pzolee.android.localwifispeedtester.  Zoltan Pallagi. WiFi Speed Test - Android Apps on Google Play. https:\/\/play.google.com\/store\/apps\/details?id=com.pzolee.android.localwifispeedtester."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"key":"e_1_3_2_2_54_1","unstructured":"Qualcomm. Qualcomm Mobile Security. https:\/\/www.qualcomm.com\/products\/features\/security\/mobile-security.  Qualcomm. Qualcomm Mobile Security. https:\/\/www.qualcomm.com\/products\/features\/security\/mobile-security."},{"key":"e_1_3_2_2_55_1","volume-title":"Recent Trends in Electronics, Information & Communication Technology (RTEICT)","author":"Sahu Ayush","unstructured":"Ayush Sahu and Ashima Singh . 2016. Securing IoT devices using JavaScript based sandbox . In Recent Trends in Electronics, Information & Communication Technology (RTEICT) . IEEE , 1476--1482. Ayush Sahu and Ashima Singh. 2016. Securing IoT devices using JavaScript based sandbox. In Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 1476--1482."},{"key":"e_1_3_2_2_56_1","unstructured":"Samsung. Samsung KNOX. https:\/\/www.samsungknox.com\/en.  Samsung. Samsung KNOX. https:\/\/www.samsungknox.com\/en."},{"key":"e_1_3_2_2_57_1","volume-title":"Workshop on Hot Topics in Operating Systems (HotOS).","author":"Santos Nuno","year":"2015","unstructured":"Nuno Santos , Nuno O Duarte , Miguel B Costa , and Paulo Ferreira . 2015 . A Case for Enforcing App-Specific Constraints to Mobile Devices by Using Trust Leases . In Workshop on Hot Topics in Operating Systems (HotOS). Nuno Santos, Nuno O Duarte, Miguel B Costa, and Paulo Ferreira. 2015. A Case for Enforcing App-Specific Constraints to Mobile Devices by Using Trust Leases. In Workshop on Hot Topics in Operating Systems (HotOS)."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508293.1508311"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666622"},{"key":"e_1_3_2_2_60_1","unstructured":"Trustonic. Trustonic. https:\/\/www.trustonic.com\/.  Trustonic. Trustonic. https:\/\/www.trustonic.com\/."},{"key":"e_1_3_2_2_61_1","unstructured":"Timothy Vidas Nicolas Christin and Lorrie Cranor. 2011. Curbing Android Permission Creep. In Web 2.0 Security and Privacy (W2SP).  Timothy Vidas Nicolas Christin and Lorrie Cranor. 2011. Curbing Android Permission Creep. In Web 2.0 Security and Privacy (W2SP)."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029822"},{"key":"e_1_3_2_2_63_1","volume-title":"Hardware Enforcement of Application Security Policies Using Tagged Memory. In USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Zeldovich Nickolai","year":"2008","unstructured":"Nickolai Zeldovich , Hari Kannan , Michael Dalton , and Christos Kozyrakis . 2008 . Hardware Enforcement of Application Security Policies Using Tagged Memory. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). Nickolai Zeldovich, Hari Kannan, Michael Dalton, and Christos Kozyrakis. 2008. Hardware Enforcement of Application Security Policies Using Tagged Memory. In USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_2_64_1","unstructured":"Yulong Zhang Zhaofeng Chen Hui Xue and Tao Wei. Fingerprints On Mobile Devices: Abusing and Leaking. https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Zhang-Fingerprints-On-Mobile-Devices-Abusing-And-Leaking-wp.pdf.  Yulong Zhang Zhaofeng Chen Hui Xue and Tao Wei. Fingerprints On Mobile Devices: Abusing and Leaking. https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Zhang-Fingerprints-On-Mobile-Devices-Abusing-And-Leaking-wp.pdf."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516689"},{"key":"e_1_3_2_2_66_1","volume-title":"Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Network and Distributed System Security Symposium (NDSS).","author":"Zhou Yajin","year":"2012","unstructured":"Yajin Zhou , Zhi Wang , Wu Zhou , and Xuxian Jiang . 2012 . Hey, You , Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Network and Distributed System Security Symposium (NDSS). Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. 2012. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022255"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.42"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.27"}],"event":{"name":"MobiSys '18: The 16th Annual International Conference on Mobile Systems, Applications, and Services","location":"Munich Germany","acronym":"MobiSys '18","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210240.3210334","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3210240.3210334","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3210240.3210334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:48Z","timestamp":1750210788000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210240.3210334"}},"subtitle":["ARM Trustzone-based Mobile Peripheral Control"],"short-title":[],"issued":{"date-parts":[[2018,6,10]]},"references-count":69,"alternative-id":["10.1145\/3210240.3210334","10.1145\/3210240"],"URL":"https:\/\/doi.org\/10.1145\/3210240.3210334","relation":{},"subject":[],"published":{"date-parts":[[2018,6,10]]},"assertion":[{"value":"2018-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}