{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:12:13Z","timestamp":1771701133454,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,10]],"date-time":"2018-06-10T00:00:00Z","timestamp":1528588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,10]]},"DOI":"10.1145\/3210240.3210338","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T12:36:06Z","timestamp":1530880566000},"page":"14-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["TruZ-Droid"],"prefix":"10.1145","author":[{"given":"Kailiang","family":"Ying","sequence":"first","affiliation":[{"name":"Syracuse University, Syracuse, New York, USA"}]},{"given":"Amit","family":"Ahlawat","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, New York, USA"}]},{"given":"Bilal","family":"Alsharifi","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, New York, USA"}]},{"given":"Yuexin","family":"Jiang","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, New York, USA"}]},{"given":"Priyank","family":"Thavai","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, New York, USA"}]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,6,10]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2016. Google Android: Vulnerability Statistics. http:\/\/www.cvedetails.com\/product\/19997\/Google-Android.html?vendor_id=1224. (2016). 2016. Google Android: Vulnerability Statistics. http:\/\/www.cvedetails.com\/product\/19997\/Google-Android.html?vendor_id=1224. (2016)."},{"key":"e_1_3_2_2_2_1","unstructured":"2017. Alipay online and mobile payments. https:\/\/intl.alipay.com\/. (2017). 2017. Alipay online and mobile payments. https:\/\/intl.alipay.com\/. (2017)."},{"key":"e_1_3_2_2_3_1","unstructured":"2017. Android Developers: Android Keystore System. https:\/\/developer.android.com\/training\/articles\/keystore.html. (2017). 2017. Android Developers: Android Keystore System. https:\/\/developer.android.com\/training\/articles\/keystore.html. (2017)."},{"key":"e_1_3_2_2_4_1","unstructured":"2017. Android Developers: Selecting Devices. https:\/\/source.android.com\/source\/devices.html. (2017). 2017. Android Developers: Selecting Devices. https:\/\/source.android.com\/source\/devices.html. (2017)."},{"key":"e_1_3_2_2_5_1","unstructured":"2017. Android Fingerprint HAL. https:\/\/source.android.com\/security\/authentication\/fingerprint-hal. (2017). 2017. Android Fingerprint HAL. https:\/\/source.android.com\/security\/authentication\/fingerprint-hal. (2017)."},{"key":"e_1_3_2_2_6_1","unstructured":"2017. BitCoin Ledger. https:\/\/www.ledgerwallet.com\/beta\/trustlet. (2017). 2017. BitCoin Ledger. https:\/\/www.ledgerwallet.com\/beta\/trustlet. (2017)."},{"key":"e_1_3_2_2_7_1","unstructured":"2017. Common used Application Layer Protocols. http:\/\/www.informit.com\/articles\/article.aspx?p=169578. (2017). 2017. Common used Application Layer Protocols. http:\/\/www.informit.com\/articles\/article.aspx?p=169578. (2017)."},{"key":"e_1_3_2_2_8_1","unstructured":"2017. Drupal Editor - app by dissem on Github. https:\/\/github.com\/Dissem\/Drupal-Editor. (2017). 2017. Drupal Editor - app by dissem on Github. https:\/\/github.com\/Dissem\/Drupal-Editor. (2017)."},{"key":"e_1_3_2_2_9_1","unstructured":"2017. Drupal: OpenSourceCMS. https:\/\/www.drupal.org\/. (2017). 2017. Drupal: OpenSourceCMS. https:\/\/www.drupal.org\/. (2017)."},{"key":"e_1_3_2_2_10_1","unstructured":"2017. Elgg: a powerful open source social networking engine. https:\/\/elgg.org\/. (2017). 2017. Elgg: a powerful open source social networking engine. https:\/\/elgg.org\/. (2017)."},{"key":"e_1_3_2_2_11_1","unstructured":"2017. F-Droidrepository. https:\/\/f-droid.org\/en\/packages\/. (2017). 2017. F-Droidrepository. https:\/\/f-droid.org\/en\/packages\/. (2017)."},{"key":"e_1_3_2_2_12_1","unstructured":"2017. FREAK CVE-2015-0204 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-0204. (2017). 2017. FREAK CVE-2015-0204 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-0204. (2017)."},{"key":"e_1_3_2_2_13_1","unstructured":"2017. Intercede\u00e2\u0102&Zacute;s MyTAM. https:\/\/www.intercede.com. (2017). 2017. Intercede\u00e2\u0102&Zacute;s MyTAM. https:\/\/www.intercede.com. (2017)."},{"key":"e_1_3_2_2_14_1","unstructured":"2017. Learn how to become a Trusted Application Developer with Trustonic. https:\/\/developer.trustonic.com\/. (2017). 2017. Learn how to become a Trusted Application Developer with Trustonic. https:\/\/developer.trustonic.com\/. (2017)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"2017. Open Trust Protocol. https:\/\/elinux.org\/images\/2\/20\/A_More_Open_Trust_Protocol.pdf. (2017). 2017. Open Trust Protocol. https:\/\/elinux.org\/images\/2\/20\/A_More_Open_Trust_Protocol.pdf. (2017).","DOI":"10.17140\/AOJ-2-111"},{"key":"e_1_3_2_2_16_1","unstructured":"2017. Poodle Bites TLS. https:\/\/blog.qualys.com\/ssllabs\/2014\/12\/08\/poodle-bites-tls. (2017). 2017. Poodle Bites TLS. https:\/\/blog.qualys.com\/ssllabs\/2014\/12\/08\/poodle-bites-tls. (2017)."},{"key":"e_1_3_2_2_17_1","unstructured":"2017. Samsung Pay. http:\/\/www.samsung.com\/us\/samsung-pay\/. (2017). 2017. Samsung Pay. http:\/\/www.samsung.com\/us\/samsung-pay\/. (2017)."},{"key":"e_1_3_2_2_18_1","unstructured":"2017. SoC and CPU System-Wide Approach to Security. https:\/\/www.arm.com\/products\/security-on-arm\/trustzone. (2017). 2017. SoC and CPU System-Wide Approach to Security. https:\/\/www.arm.com\/products\/security-on-arm\/trustzone. (2017)."},{"key":"e_1_3_2_2_19_1","unstructured":"2017. This POODLE Bites: Exploiting the SSL 3.0 Fallback. https:\/\/www.openssl.org\/~bodo\/ssl-poodle.pdf. (2017). 2017. This POODLE Bites: Exploiting the SSL 3.0 Fallback. https:\/\/www.openssl.org\/~bodo\/ssl-poodle.pdf. (2017)."},{"key":"e_1_3_2_2_20_1","unstructured":"2017. TruZ-Droid Usability Education Video for Payment. https:\/\/youtu.be\/qVWwmpickgQ. (2017). 2017. TruZ-Droid Usability Education Video for Payment. https:\/\/youtu.be\/qVWwmpickgQ. (2017)."},{"key":"e_1_3_2_2_21_1","unstructured":"2017. TruZ-Droid Usability Education Video for Typing Password. https:\/\/youtu.be\/BZrpKZdQB0g. (2017). 2017. TruZ-Droid Usability Education Video for Typing Password. https:\/\/youtu.be\/BZrpKZdQB0g. (2017)."},{"key":"e_1_3_2_2_22_1","unstructured":"2017. TruZ-Droid Usability Survey pdf. https:\/\/drive.google.com\/open?id=1w0_X_99X69eXw4vEeKD_e0QNbPOTNeO6.(2017). 2017. TruZ-Droid Usability Survey pdf. https:\/\/drive.google.com\/open?id=1w0_X_99X69eXw4vEeKD_e0QNbPOTNeO6.(2017)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813707"},{"key":"e_1_3_2_2_24_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI' 16)","author":"Arnautov Sergei","year":"2016"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685070"},{"key":"e_1_3_2_2_27_1","volume-title":"IEEE Symposium on Security and Privacy.","author":"Bhargavan Karthikeyan","year":"2017"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132736.1132768"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25283-9_15"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132029"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694380"},{"key":"e_1_3_2_2_32_1","volume-title":"SpanDex: Secure Password Tracking for Android. In 23rd USENIX Security Symposium (USENIX Security 14)","author":"Cox Landon P.","year":"2014"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_3_2_2_34_1","unstructured":"Earlence Fernandes Qi Alfred Chen Georg Essl J. Alex Halderman Z. Morley Mao and Atul Prakash. 2014. TIVOs: Trusted Visual I\/O Paths for Android. Technical Report. University of Michigan. Earlence Fernandes Qi Alfred Chen Georg Essl J. Alex Halderman Z. Morley Mao and Atul Prakash. 2014. TIVOs: Trusted Visual I\/O Paths for Android. Technical Report. University of Michigan."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Earlence Fernandes Qi Alfred Chen Justin Paupore Georg Essl J. Alex Halderman Z. Morley Mao and Atul Prakash. 2017. Android UI Deception Revisited: Attacks and Defenses. Earlence Fernandes Qi Alfred Chen Justin Paupore Georg Essl J. Alex Halderman Z. Morley Mao and Atul Prakash. 2017. Android UI Deception Revisited: Attacks and Defenses.","DOI":"10.1007\/978-3-662-54970-4_3"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3166.3170"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.11"},{"key":"e_1_3_2_2_38_1","volume-title":"26th USENIX Security Symposium (USENIXSecurity17)","author":"Hua Zhichao","year":"2017"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23011"},{"key":"e_1_3_2_2_40_1","unstructured":"Jinsoo Jang Changho Choi Jaehyuk Lee Nohyun Kwak Seongman Lee Yeseul Choi and Brent Byunghoon Kang. 2016. PrivateZone: Providing a Private Execution Environment using ARM TrustZone. IEEE Transactions on Dependable and Secure Computing (2016). Jinsoo Jang Changho Choi Jaehyuk Lee Nohyun Kwak Seongman Lee Yeseul Choi and Brent Byunghoon Kang. 2016. PrivateZone: Providing a Private Execution Environment using ARM TrustZone. IEEE Transactions on Dependable and Secure Computing (2016)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"Jinsoo Jang Sunjune Kong Minsu Kim Daegyeong Kim and Brent Byunghoon Kang. 2015. SeCReT: Secure Channel between Rich Execution Environment and TEE. In NDSS. Jinsoo Jang Sunjune Kong Minsu Kim Daegyeong Kim and Brent Byunghoon Kang. 2015. SeCReT: Secure Channel between Rich Execution Environment and TEE. In NDSS.","DOI":"10.14722\/ndss.2015.23189"},{"key":"e_1_3_2_2_42_1","volume-title":"Security and Usability: Analysis and Evaluation. 2010 International Conference on Availability, Reliability and Security","author":"Kainda Ronald","year":"2010"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742676"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637166.2637225"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2014.13"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130941"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2565585.2565591"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2465425"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307670"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23227"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241143"},{"key":"e_1_3_2_2_52_1","unstructured":"OP-TEE. 2015. OPTEEOS. (2015). https:\/\/github.com\/OP-TEE\/optee_os OP-TEE. 2015. OPTEEOS. (2015). https:\/\/github.com\/OP-TEE\/optee_os"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884817"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813650"},{"key":"e_1_3_2_2_55_1","unstructured":"Samsung. 2013. KNOX White Paper. (2013). Samsung. 2013. KNOX White Paper. (2013)."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081346"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541949"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23037"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23500"},{"key":"e_1_3_2_2_61_1","unstructured":"Louis Sobel. 2015. Secure Input Overlays: Increasing Security for Sensitive Data on Android. Master's thesis. Massachusetts Institute of Technology MA USA. Louis Sobel. 2015. Secure Input Overlays: Increasing Security for Sensitive Data on Android. Master's thesis. Massachusetts Institute of Technology MA USA."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808120"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813692"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.11"},{"key":"e_1_3_2_2_65_1","volume-title":"Proceedings of Mobile Security Technologies","author":"Tong Tianhao","year":"2013"},{"key":"e_1_3_2_2_66_1","unstructured":"Trustonic. 2012. Trustonic TEE Trusted User Interface. (2012). Trustonic. 2012. Trustonic TEE Trusted User Interface. (2012)."},{"key":"e_1_3_2_2_67_1","volume-title":"Proceedings of the 21st European Symposium on Research in Computer Security","author":"Weichbrodt Nico","year":"2016"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741977"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940343.2940349"},{"key":"e_1_3_2_2_71_1","volume-title":"Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS&P' 16)","author":"Zhang Ning"},{"key":"e_1_3_2_2_72_1","volume-title":"Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P' 16)","author":"Zhang Ning"},{"key":"e_1_3_2_2_73_1","first-page":"980","article-title":"TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices","volume":"2016","author":"Zhang Ning","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.61"},{"key":"e_1_3_2_2_75_1","volume-title":"Proceedings of the 4th International Conference on Trust and Trustworthy Computing. Springer-Verlag","author":"Zhou Yajin"}],"event":{"name":"MobiSys '18: The 16th Annual International Conference on Mobile Systems, Applications, and Services","location":"Munich Germany","acronym":"MobiSys '18","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210240.3210338","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3210240.3210338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:48Z","timestamp":1750210788000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210240.3210338"}},"subtitle":["Integrating TrustZone with Mobile Operating System"],"short-title":[],"issued":{"date-parts":[[2018,6,10]]},"references-count":75,"alternative-id":["10.1145\/3210240.3210338","10.1145\/3210240"],"URL":"https:\/\/doi.org\/10.1145\/3210240.3210338","relation":{},"subject":[],"published":{"date-parts":[[2018,6,10]]},"assertion":[{"value":"2018-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}