{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:54Z","timestamp":1750221114529,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T00:00:00Z","timestamp":1552435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1718086"],"award-info":[{"award-number":["1718086"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,13]]},"DOI":"10.1145\/3292006.3300035","type":"proceedings-article","created":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T12:22:04Z","timestamp":1553170924000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["TruZ-View"],"prefix":"10.1145","author":[{"given":"Kailiang","family":"Ying","sequence":"first","affiliation":[{"name":"Syraucse University, Syracuse, NY, USA"}]},{"given":"Priyank","family":"Thavai","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Android Developers: Selecting Devices. https:\/\/source.android.com\/source\/ devices.html. (2017).  2017. Android Developers: Selecting Devices. https:\/\/source.android.com\/source\/ devices.html. (2017)."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. F-Droid repository. https:\/\/f-droid.org\/en\/packages\/. (2017).  2017. F-Droid repository. https:\/\/f-droid.org\/en\/packages\/. (2017)."},{"key":"e_1_3_2_1_3_1","unstructured":"2017. Samsung Pay. http:\/\/www.samsung.com\/us\/samsung-pay\/. (2017).  2017. Samsung Pay. http:\/\/www.samsung.com\/us\/samsung-pay\/. (2017)."},{"key":"e_1_3_2_1_4_1","unstructured":"2017. TrustKernel T6 Secure OS. https:\/\/www.trustkernel.com\/en\/products\/tee\/ t6.html. (2017).  2017. TrustKernel T6 Secure OS. https:\/\/www.trustkernel.com\/en\/products\/tee\/ t6.html. (2017)."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Android WindowManager FLAG SECURE. https:\/\/developer.android.com\/ reference\/android\/view\/WindowManager.LayoutParams. (2018).  2018. Android WindowManager FLAG SECURE. https:\/\/developer.android.com\/ reference\/android\/view\/WindowManager.LayoutParams. (2018)."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. Google Android: Vulnerability Statistics. http:\/\/www.cvedetails.com\/ product\/19997\/Google-Android.html?vendor_id=1224. (2018).  2018. Google Android: Vulnerability Statistics. http:\/\/www.cvedetails.com\/ product\/19997\/Google-Android.html?vendor_id=1224. (2018)."},{"key":"e_1_3_2_1_7_1","unstructured":"2018. MCUFont. https:\/\/github.com\/mcufont\/mcufont. (2018).  2018. MCUFont. https:\/\/github.com\/mcufont\/mcufont. (2018)."},{"key":"e_1_3_2_1_8_1","unstructured":"2018. Tk graphical user interface toolkit. https:\/\/www.tcl.tk\/. (2018).  2018. Tk graphical user interface toolkit. https:\/\/www.tcl.tk\/. (2018)."},{"key":"e_1_3_2_1_9_1","unstructured":"2018. XEN security vulnerability. https:\/\/www.cvedetails.com\/vulnerability-list\/ vendor_id-6276\/XEN.html. (2018).  2018. XEN security vulnerability. https:\/\/www.cvedetails.com\/vulnerability-list\/ vendor_id-6276\/XEN.html. (2018)."},{"key":"e_1_3_2_1_10_1","unstructured":"2018. Xlib X Language X Interface. https:\/\/www.x.org\/archive\/X11R7.5\/doc\/ libX11\/libX11.html. (2018).  2018. Xlib X Language X Interface. https:\/\/www.x.org\/archive\/X11R7.5\/doc\/ libX11\/libX11.html. (2018)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081346"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Antonio Bianchi Jacopo Corbetta Luca Invernizzi Yanick Fratantonio Christopher Kruegel and Giovanni Vigna. 2015. What the App is That? Deception and Countermeasures in the Android User Interface. (2015).  Antonio Bianchi Jacopo Corbetta Luca Invernizzi Yanick Fratantonio Christopher Kruegel and Giovanni Vigna. 2015. What the App is That? Deception and Countermeasures in the Android User Interface. (2015).","DOI":"10.1109\/SP.2015.62"},{"volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Chen Qi Alfred","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Alexandra Dmitrienko Zecir Hadzic Hans L\u00f6hr Ahmad-Reza Sadeghi and Marcel Winandy. 2013. Securing the Access to Electronic Health Records on Mobile Phones. In Biomedical Engineering Systems and Technologies.  Alexandra Dmitrienko Zecir Hadzic Hans L\u00f6hr Ahmad-Reza Sadeghi and Marcel Winandy. 2013. Securing the Access to Electronic Health Records on Mobile Phones. In Biomedical Engineering Systems and Technologies.","DOI":"10.1007\/978-3-642-29752-6_27"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.39"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134021"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742676"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210330"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637166.2637225"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2565585.2565591"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37119-6_15"},{"volume-title":"https:\/\/github.com\/OP-TEE\/optee_os","year":"2015","author":"OP-TEE.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"Chuangang Ren Peng Liu and Sencun Zhu. 2017. WindowGuard: Systematic Protection of GUI Security in Android. In NDSS.  Chuangang Ren Peng Liu and Sencun Zhu. 2017. WindowGuard: Systematic Protection of GUI Security in Android. In NDSS."},{"volume-title":"Towards Discovering and Understanding Task Hijacking in Android. In 24th USENIX Security Symposium (USENIX Security 15)","year":"2015","author":"Ren Chuangang","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","unstructured":"B. Robert V. Julian and N. Jan. 2016. The Threat of Virtualization: Hypervisor- Based Rootkits on the ARM Architecture. In Information and Communications Security.  B. Robert V. Julian and N. Jan. 2016. The Threat of Virtualization: Hypervisor- Based Rootkits on the ARM Architecture. In Information and Communications Security."},{"volume-title":"Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX.","author":"Roesner Franziska","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","unstructured":"Samsung. 2013. KNOX White Paper. (2013).  Samsung. 2013. KNOX White Paper. (2013)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813692"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.12"},{"key":"e_1_3_2_1_30_1","unstructured":"Trustonic. 2012. Trustonic TEE Trusted User Interface. (2012).  Trustonic. 2012. Trustonic TEE Trusted User Interface. (2012)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Bo Yang Kang Yang Zhenfeng Zhang Yu Qin and Dengguo Feng. 2016. AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash. In Information Security.  Bo Yang Kang Yang Zhenfeng Zhang Yu Qin and Dengguo Feng. 2016. AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash. In Information Security.","DOI":"10.1007\/978-3-319-45871-7_9"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210338"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_20"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Xiao Zhang Kailiang Ying Yousra Aafer Zhenshen Qiu and Wenliang Du. 2016. Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android. In NDSS.  Xiao Zhang Kailiang Ying Yousra Aafer Zhenshen Qiu and Wenliang Du. 2016. Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android. In NDSS.","DOI":"10.14722\/ndss.2016.23061"},{"volume-title":"ISCC","author":"Zheng Xianyi","key":"e_1_3_2_1_35_1"}],"event":{"name":"CODASPY '19: Ninth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Richardson Texas USA","acronym":"CODASPY '19"},"container-title":["Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292006.3300035","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292006.3300035","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292006.3300035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:02Z","timestamp":1750208522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292006.3300035"}},"subtitle":["Developing TrustZone User Interface for Mobile OS Using Delegation Integration Model"],"short-title":[],"issued":{"date-parts":[[2019,3,13]]},"references-count":35,"alternative-id":["10.1145\/3292006.3300035","10.1145\/3292006"],"URL":"https:\/\/doi.org\/10.1145\/3292006.3300035","relation":{},"subject":[],"published":{"date-parts":[[2019,3,13]]},"assertion":[{"value":"2019-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}