{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:30Z","timestamp":1750308690215,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-13-1-0421 (MURI) W911NF-15-1-0576"],"award-info":[{"award-number":["W911NF-13-1-0421 (MURI) W911NF-15-1-0576"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772518"],"award-info":[{"award-number":["61772518"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cyber Security Program of National Key RD Plan of China","award":["2017YFB0802100"],"award-info":[{"award-number":["2017YFB0802100"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1505664 CNS-1814679"],"award-info":[{"award-number":["CNS-1505664 CNS-1814679"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3319721","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"34-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Protecting mobile devices from physical memory attacks with targeted encryption"],"prefix":"10.1145","author":[{"given":"Le","family":"Guan","sequence":"first","affiliation":[{"name":"University of Georgia"}]},{"given":"Chen","family":"Cao","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"Security Research Center, China and IIE, CAS, China"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Yubin","family":"Xia","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[{"name":"University of Kansas"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/developer.android.com\/studio\/test\/monkey.html","author":"Developers Android","year":"2017","unstructured":"Android Developers . 2017. UI\/ Application Exerciser Monkey . ( 2017 ). https:\/\/developer.android.com\/studio\/test\/monkey.html . Android Developers. 2017. UI\/Application Exerciser Monkey. (2017). https:\/\/developer.android.com\/studio\/test\/monkey.html."},{"key":"e_1_3_2_1_2_1","unstructured":"ARM Ltd. 2009. Security Technology Building a Secure System Using TrustZone Technology (white paper). (2009).  ARM Ltd. 2009. Security Technology Building a Secure System Using TrustZone Technology (white paper). (2009)."},{"key":"e_1_3_2_1_3_1","unstructured":"ARM Ltd. 2014. ARM Cortex-A57 MPCore Processor Technical Reference Manual. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.ddi0488d\/index.html.  ARM Ltd. 2014. ARM Cortex-A57 MPCore Processor Technical Reference Manual. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.ddi0488d\/index.html."},{"key":"e_1_3_2_1_4_1","unstructured":"ARM Ltd. 2019. The Arm System Memory Management Units. https:\/\/developer.arm.com\/products\/system-ip\/system-controllers\/system-memory-management-unit.  ARM Ltd. 2019. The Arm System Memory Management Units. https:\/\/developer.arm.com\/products\/system-ip\/system-controllers\/system-memory-management-unit."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX Security Symposium.","author":"Chow Jim","year":"2004","unstructured":"Jim Chow , Ben Pfaff , Tal Garfinkel , Kevin Christopher , and Mendel Rosenblum . 2004 . Understanding data lifetime via whole system simulation . In USENIX Security Symposium. Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, and Mendel Rosenblum. 2004. Understanding data lifetime via whole system simulation. In USENIX Security Symposium."},{"key":"e_1_3_2_1_7_1","volume-title":"Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation. In USENIX Security '05","author":"Chow Jim","year":"2005","unstructured":"Jim Chow , Ben Pfaff , Tal Garfinkel , and Mendel Rosenblum . 2005 . Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation. In USENIX Security '05 . Jim Chow, Ben Pfaff, Tal Garfinkel, and Mendel Rosenblum. 2005. Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation. In USENIX Security '05."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694380"},{"key":"e_1_3_2_1_9_1","unstructured":"Consumer Reports. 2015. Smartphone thefts drop as kill switch usage grows. http:\/\/www.consumerreports.org\/cro\/news\/2015\/06\/smartphone-thefts-on-the-decline\/index.htm.  Consumer Reports. 2015. Smartphone thefts drop as kill switch usage grows. http:\/\/www.consumerreports.org\/cro\/news\/2015\/06\/smartphone-thefts-on-the-decline\/index.htm."},{"key":"e_1_3_2_1_10_1","volume-title":"Sheth","author":"Enck William","year":"2010","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N . Sheth . 2010 . TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones (OSDI '10). William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones (OSDI'10)."},{"key":"e_1_3_2_1_11_1","unstructured":"EPN Solutions. 2017. Analysis tools for DDR1 DDR2 DDR3 embedded DDR and Fully Buffered DIMM modules. http:\/\/www.epnsolutions.net\/ddr.html.  EPN Solutions. 2017. Analysis tools for DDR1 DDR2 DDR3 embedded DDR and Fully Buffered DIMM modules. http:\/\/www.epnsolutions.net\/ddr.html."},{"key":"e_1_3_2_1_12_1","unstructured":"FuturePlus System. 2006. DDR2 800 bus analysis probe. http:\/\/www.futureplus.com\/download\/datasheet\/fs2334_ds.pdf.  FuturePlus System. 2006. DDR2 800 bus analysis probe. http:\/\/www.futureplus.com\/download\/datasheet\/fs2334_ds.pdf."},{"key":"e_1_3_2_1_13_1","unstructured":"Google inc. 2017. Dalvik bytecode. https:\/\/source.android.com\/devices\/tech\/dalvik\/dalvik-bytecode.  Google inc. 2017. Dalvik bytecode. https:\/\/source.android.com\/devices\/tech\/dalvik\/dalvik-bytecode."},{"key":"e_1_3_2_1_14_1","unstructured":"Johannes G\u00f6tzfried Tilo M\u00fcller Gabor Drescher Stefan N\u00fcrnberger and Michael Backes. {n. d.}. RamCrypt: Kernel-based Address Space Encryption for User-mode Processes (ASIA CCS '16). 6.  Johannes G\u00f6tzfried Tilo M\u00fcller Gabor Drescher Stefan N\u00fcrnberger and Michael Backes. {n. d.}. RamCrypt: Kernel-based Address Space Encryption for User-mode Processes (ASIA CCS '16). 6."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.8"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.23"},{"volume-title":"Lest We Remember: Cold Boot Attacks on Encryption Keys. In 17th USENIX Security Symposium. 45--60","author":"Halderman J.","key":"e_1_3_2_1_17_1","unstructured":"J. Halderman , S. Schoen , N. Heninger , W. Clarkson , W. Paul , J. Calandrino , A. Feldman , J. Appelbaum , and E. Felten . 2008 . Lest We Remember: Cold Boot Attacks on Encryption Keys. In 17th USENIX Security Symposium. 45--60 . J. Halderman, S. Schoen, N. Heninger, W. Clarkson, W. Paul, J. Calandrino, A. Feldman, J. Appelbaum, and E. Felten. 2008. Lest We Remember: Cold Boot Attacks on Encryption Keys. In 17th USENIX Security Symposium. 45--60."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_19"},{"key":"e_1_3_2_1_19_1","volume-title":"SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In 24th USENIX Security Symposium. USENIX Association, Washington, D.C., 977--992","author":"Huang Jianjun","year":"2015","unstructured":"Jianjun Huang , Zhichun Li , Xusheng Xiao , Zhenyu Wu , Kangjie Lu , Xiangyu Zhang , and Guofei Jiang . 2015 . SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In 24th USENIX Security Symposium. USENIX Association, Washington, D.C., 977--992 . Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, and Guofei Jiang. 2015. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In 24th USENIX Security Symposium. USENIX Association, Washington, D.C., 977--992."},{"key":"e_1_3_2_1_20_1","unstructured":"Google inc. 2017. Full-Disk Encryption. https:\/\/source.android.com\/security\/encryption\/full-disk.  Google inc. 2017. Full-Disk Encryption. https:\/\/source.android.com\/security\/encryption\/full-disk."},{"volume-title":"AMD x86 Memory Encryption Technologies","author":"Kaplan David","key":"e_1_3_2_1_21_1","unstructured":"David Kaplan . 2016. AMD x86 Memory Encryption Technologies . USENIX Association , Austin, TX . David Kaplan. 2016. AMD x86 Memory Encryption Technologies. USENIX Association, Austin, TX."},{"key":"e_1_3_2_1_22_1","unstructured":"Vadim Kolontsov. 1996. Solaris (and others) ftpd core dump bug. http:\/\/insecure.org\/sploits\/ftpd.pasv.html.  Vadim Kolontsov. 1996. Solaris (and others) ftpd core dump bug. http:\/\/insecure.org\/sploits\/ftpd.pasv.html."},{"key":"e_1_3_2_1_23_1","unstructured":"Doug Lea and Wolfram Gloger. 1996. A memory allocator. http:\/\/g.oswego.edu\/dl\/html\/malloc.html.  Doug Lea and Wolfram Gloger. 1996. A memory allocator. http:\/\/g.oswego.edu\/dl\/html\/malloc.html."},{"key":"e_1_3_2_1_24_1","unstructured":"Lookout. 2014. Phone Theft in America: What really happens when your phone gets grabbed. https:\/\/blog.lookout.com\/phone-theft-in-america.  Lookout. 2014. Phone Theft in America: What really happens when your phone gets grabbed. https:\/\/blog.lookout.com\/phone-theft-in-america."},{"key":"e_1_3_2_1_25_1","volume-title":"Savagaonkar","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen , Ilya Alexandrovich , Alex Berenzon , Carlos V. Rozas , Hisham Shafi , Vedvyas Shanbhogue , and Uday R . Savagaonkar . 2013 . Innovative Instructions and Software Model for Isolated Execution (HASP '13). Article 10, 1 pages. Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R. Savagaonkar. 2013. Innovative Instructions and Software Model for Isolated Execution (HASP '13). Article 10, 1 pages."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_23"},{"key":"e_1_3_2_1_27_1","volume-title":"UIPicker: User-Input Privacy Identification in Mobile Applications. In 24th USENIX Security Symposium. Washington, D.C., 993--1008","author":"Nan Yuhong","year":"2015","unstructured":"Yuhong Nan , Min Yang , Zhemin Yang , Shunfan Zhou , Guofei Gu , and XiaoFeng Wang . 2015 . UIPicker: User-Input Privacy Identification in Mobile Applications. In 24th USENIX Security Symposium. Washington, D.C., 993--1008 . Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, and XiaoFeng Wang. 2015. UIPicker: User-Input Privacy Identification in Mobile Applications. In 24th USENIX Security Symposium. Washington, D.C., 993--1008."},{"volume-title":"No Sugar but all the Taste! Memory Encryption without Architectural Support (ESORICS '17)","author":"Papadopoulos Panagiotis","key":"e_1_3_2_1_28_1","unstructured":"Panagiotis Papadopoulos , Giorgos Vasiliadis , Giorgos Christou , Evangelos Markatos , and Sotiris Ioannidis . 2017. No Sugar but all the Taste! Memory Encryption without Architectural Support (ESORICS '17) . Springer , 362--380. Panagiotis Papadopoulos, Giorgos Vasiliadis, Giorgos Christou, Evangelos Markatos, and Sotiris Ioannidis. 2017. No Sugar but all the Taste! Memory Encryption without Architectural Support (ESORICS '17). Springer, 362--380."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2010.5655081"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978343"},{"key":"e_1_3_2_1_31_1","volume-title":"CleanOS: Limiting Mobile Data Exposure with Idle Eviction (OSDI '12)","author":"Tang Yang","year":"2012","unstructured":"Yang Tang , Phillip Ames , Sravan Bhamidipati , Ashish Bijlani , Roxana Geambasu , and Nikhil Sarda . 2012 . CleanOS: Limiting Mobile Data Exposure with Idle Eviction (OSDI '12) . USENIX, Hollywood, CA, 77--91. Yang Tang, Phillip Ames, Sravan Bhamidipati, Ashish Bijlani, Roxana Geambasu, and Nikhil Sarda. 2012. CleanOS: Limiting Mobile Data Exposure with Idle Eviction (OSDI '12). USENIX, Hollywood, CA, 77--91."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2724966.2725064"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741977"},{"key":"e_1_3_2_1_34_1","volume-title":"Powertutor-a power monitor for android-based mobile platforms. EECS","author":"Yang Z","year":"2012","unstructured":"Z Yang . 2012. Powertutor-a power monitor for android-based mobile platforms. EECS , University of Michigan , retrieved September 2 ( 2012 ), 19. Z Yang. 2012. Powertutor-a power monitor for android-based mobile platforms. EECS, University of Michigan, retrieved September 2 (2012), 19."},{"volume-title":"CaSE: Cache-Assisted Secure Execution on ARM Processors. In 2016 IEEE Symposium on Security and Privacy (SP). 72--90","author":"Zhang N.","key":"e_1_3_2_1_35_1","unstructured":"N. Zhang , K. Sun , W. Lou , and Y. T. Hou . 2016 . CaSE: Cache-Assisted Secure Execution on ARM Processors. In 2016 IEEE Symposium on Security and Privacy (SP). 72--90 . N. Zhang, K. Sun, W. Lou, and Y. T. Hou. 2016. CaSE: Cache-Assisted Secure Execution on ARM Processors. In 2016 IEEE Symposium on Security and Privacy (SP). 72--90."}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami Florida","acronym":"WiSec '19"},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319721","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3319721","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3319721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:17Z","timestamp":1750276877000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319721"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":35,"alternative-id":["10.1145\/3317549.3319721","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3319721","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}