{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:45Z","timestamp":1763507745361,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Mcity University of Michigan"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3375706.3380552","type":"proceedings-article","created":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T19:35:07Z","timestamp":1584041707000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["CVShield"],"prefix":"10.1145","author":[{"given":"Shengtuo","family":"Hu","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Qi Alfred","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Jiwon","family":"Joung","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Can","family":"Carlak","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Yiheng","family":"Feng","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Henry X.","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ARM Ltd. 2019 a. Address Space Controllers -- Arm . https:\/\/tinyurl.com\/uxjdnfz .  ARM Ltd. 2019 a. Address Space Controllers -- Arm . https:\/\/tinyurl.com\/uxjdnfz ."},{"volume-title":"SMC Calling Convention - ARM Infocenter . https:\/\/tinyurl.com\/y6gkrpo3 .","year":"2019","author":"Ltd ARM","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"ARM Ltd. 2019 c. TrustZone -- Arm Developer . https:\/\/tinyurl.com\/vj29ybd .  ARM Ltd. 2019 c. TrustZone -- Arm Developer . https:\/\/tinyurl.com\/vj29ybd ."},{"key":"e_1_3_2_1_4_1","unstructured":"Boundary Devices. 2019 a. boundarydevices\/linux-imx6 . https:\/\/tinyurl.com\/w66kfkj .  Boundary Devices. 2019 a. boundarydevices\/linux-imx6 . https:\/\/tinyurl.com\/w66kfkj ."},{"key":"e_1_3_2_1_5_1","unstructured":"Boundary Devices. 2019 b. i.MX6 ARM Development Board . https:\/\/boundarydevices.com\/product\/bd-sl-i-mx6\/.  Boundary Devices. 2019 b. i.MX6 ARM Development Board . https:\/\/boundarydevices.com\/product\/bd-sl-i-mx6\/."},{"volume-title":"Proc. USENIX Security .","year":"2011","author":"Checkoway Stephen","key":"e_1_3_2_1_6_1"},{"volume-title":"Liu","year":"2018","author":"Chen Qi Alfred","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"Cohda Wireless. 2019. Cohda MK5 OBU. https:\/\/tinyurl.com\/y6qepj6h .  Cohda Wireless. 2019. Cohda MK5 OBU. https:\/\/tinyurl.com\/y6qepj6h ."},{"volume-title":"Dedicated Short Range Communications (DSRC) Message Set Dictionary? Set. SAE International (Mar","year":"2016","author":"Cross-Cutting Technical Committee","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"GlobalPlatform. 2019. GlobalPlatform Homepage - GlobalPlatform . https:\/\/globalplatform.org\/.  GlobalPlatform. 2019. GlobalPlatform Homepage - GlobalPlatform . https:\/\/globalplatform.org\/."},{"key":"e_1_3_2_1_11_1","unstructured":"GPSD project. 2019. biiont\/gpsd . https:\/\/github.com\/biiont\/gpsd .  GPSD project. 2019. biiont\/gpsd . https:\/\/github.com\/biiont\/gpsd ."},{"volume-title":"IEEE Guide for Wireless Access in Vehicular Environments (WAVE) Architecture","year":"2019","author":"IEEE 1609 Working Group","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_15_1","unstructured":"Linaro Ltd. 2019 a. OP-TEE\/optee_os . https:\/\/tinyurl.com\/rurhgcl .  Linaro Ltd. 2019 a. OP-TEE\/optee_os . https:\/\/tinyurl.com\/rurhgcl ."},{"key":"e_1_3_2_1_16_1","unstructured":"Linaro Ltd. 2019 b. Open Portable Trusted Execution Environment - OP-TEE . https:\/\/www.op-tee.org\/.  Linaro Ltd. 2019 b. Open Portable Trusted Execution Environment - OP-TEE . https:\/\/www.op-tee.org\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307670"},{"key":"e_1_3_2_1_18_1","unstructured":"Sahar Mazloom Mohammad Rezaeirad Aaron Hunter and Damon McCoy. 2016. A Security Analysis of an In-Vehicle Infotainment and App Platform. In USENIX WOOT.  Sahar Mazloom Mohammad Rezaeirad Aaron Hunter and Damon McCoy. 2016. A Security Analysis of an In-Vehicle Infotainment and App Platform. In USENIX WOOT."},{"key":"e_1_3_2_1_19_1","unstructured":"U.S. Department of Transportation (US DOT). 2019. Intelligent Transportation Systems - Connected Vehicle Basics . https:\/\/tinyurl.com\/yxjj98vr .  U.S. Department of Transportation (US DOT). 2019. Intelligent Transportation Systems - Connected Vehicle Basics . https:\/\/tinyurl.com\/yxjj98vr ."},{"volume-title":"Proc. ICSE.","year":"1981","author":"Weiser Mark","key":"e_1_3_2_1_20_1"},{"volume-title":"Proc. USENIX Security .","year":"2018","author":"Zeng Kexiong","key":"e_1_3_2_1_21_1"}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"New Orleans LA USA","acronym":"CODASPY '20"},"container-title":["Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375706.3380552","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3375706.3380552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:15Z","timestamp":1750199895000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375706.3380552"}},"subtitle":["Guarding Sensor Data in Connected Vehicle with Trusted Execution Environment"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":20,"alternative-id":["10.1145\/3375706.3380552","10.1145\/3375706"],"URL":"https:\/\/doi.org\/10.1145\/3375706.3380552","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}