{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T06:49:51Z","timestamp":1767422991735,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"name":"FNR","award":["13624693"],"award-info":[{"award-number":["13624693"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3494107.3522774","type":"proceedings-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T16:36:10Z","timestamp":1652805370000},"page":"85-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M Devices"],"prefix":"10.1145","author":[{"given":"Antonio Ken","family":"Iannillo","sequence":"first","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sean","family":"Rivera","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Darius","family":"Suciu","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Radu","family":"Sion","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Trustzone: Integrated hardware and software security. White paper","author":"Alves Tiago","year":"2004","unstructured":"Tiago Alves . 2004 . Trustzone: Integrated hardware and software security. White paper (2004). Tiago Alves. 2004. Trustzone: Integrated hardware and software security. White paper (2004)."},{"key":"e_1_3_2_1_2_1","unstructured":"ARM. 2008. ARM Introduces Software Interface Standard for Cortex Processor-Based Microcontroller . http:\/\/www.arm.com\/about\/newsroom\/23722.php  ARM. 2008. ARM Introduces Software Interface Standard for Cortex Processor-Based Microcontroller . http:\/\/www.arm.com\/about\/newsroom\/23722.php"},{"key":"e_1_3_2_1_3_1","volume-title":"Security technology building a secure system using trustzone technology (white paper). ARM Limited","author":"A ARM.","year":"2009","unstructured":"A ARM. 2009. Security technology building a secure system using trustzone technology (white paper). ARM Limited ( 2009 ). A ARM. 2009. Security technology building a secure system using trustzone technology (white paper). ARM Limited (2009)."},{"volume-title":"14th $$USENIX$$ Workshop on Offensive Technologies ($$WOOT$$ 20) .","author":"Busch Marcel","key":"e_1_3_2_1_4_1","unstructured":"Marcel Busch , Johannes Westphal , and Tilo Mueller . 2020. Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment . In 14th $$USENIX$$ Workshop on Offensive Technologies ($$WOOT$$ 20) . Marcel Busch, Johannes Westphal, and Tilo Mueller. 2020. Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment. In 14th $$USENIX$$ Workshop on Offensive Technologies ($$WOOT$$ 20) ."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of Twelfth Real-Time Linux Workshop","author":"Frenzel Torsten","year":"2010","unstructured":"Torsten Frenzel , Adam Lackorzynski , Alexander Warg , and Hermann H\"artig. 2010 . Arm trustzone as a virtualization technique in embedded systems . In Proceedings of Twelfth Real-Time Linux Workshop , Nairobi, Kenya. 29--42. Torsten Frenzel, Adam Lackorzynski, Alexander Warg, and Hermann H\"artig. 2010. Arm trustzone as a virtualization technique in embedded systems. In Proceedings of Twelfth Real-Time Linux Workshop, Nairobi, Kenya. 29--42."},{"key":"e_1_3_2_1_6_1","volume-title":"TEE System Architecture . https:\/\/globalplatform.org\/wp-content\/uploads\/2017\/01\/GPD_TEE_SystemArch_v1.2_PublicRelease.pdf Retrieved","author":"Inc. GlobalPlatform. 2018.","year":"2021","unstructured":"Inc. GlobalPlatform. 2018. TEE System Architecture . https:\/\/globalplatform.org\/wp-content\/uploads\/2017\/01\/GPD_TEE_SystemArch_v1.2_PublicRelease.pdf Retrieved December 1, 2021 from Inc. GlobalPlatform. 2018. TEE System Architecture . https:\/\/globalplatform.org\/wp-content\/uploads\/2017\/01\/GPD_TEE_SystemArch_v1.2_PublicRelease.pdf Retrieved December 1, 2021 from"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22496-7_11"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of INFORUM .","author":"Guerra Miguel","year":"2017","unstructured":"Miguel Guerra , Miguel Correia , Benjamin Taubmann , and Hans P Reiser . 2017 . ITZ: an introspection library for ARM TrustZone . In Proceedings of INFORUM . Miguel Guerra, Miguel Correia, Benjamin Taubmann, and Hans P Reiser. 2017. ITZ: an introspection library for ARM TrustZone. In Proceedings of INFORUM ."},{"key":"e_1_3_2_1_9_1","volume-title":"Introspection for ARM TrustZone with the ITZ Library. In 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS). IEEE, 123--134","author":"Guerra Miguel","year":"2018","unstructured":"Miguel Guerra , Benjamin Taubmann , Hans P Reiser , Sileshi Yalew , and Miguel Correia . 2018 . Introspection for ARM TrustZone with the ITZ Library. In 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS). IEEE, 123--134 . Miguel Guerra, Benjamin Taubmann, Hans P Reiser, Sileshi Yalew, and Miguel Correia. 2018. Introspection for ARM TrustZone with the ITZ Library. In 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS). IEEE, 123--134."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2019.00110"},{"key":"e_1_3_2_1_12_1","volume-title":"An Effective Authentication for Client Application Using ARM TrustZone. In International Conference on Information Security Practice and Experience .","author":"Jiang Hang","year":"2017","unstructured":"Hang Jiang , Rui Chang , Lu Ren , Weiyu Dong , Liehui Jiang , and Shuiqiao Yang . 2017 . An Effective Authentication for Client Application Using ARM TrustZone. In International Conference on Information Security Practice and Experience . Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang, and Shuiqiao Yang. 2017. An Effective Authentication for Client Application Using ARM TrustZone. In International Conference on Information Security Practice and Experience ."},{"key":"e_1_3_2_1_13_1","volume-title":"Unbox Your Phone . https:\/\/medium.com\/taszksec\/unbox-your-phone-part-i-331bbf44c30c Retrieved","author":"Komaromy Daniel","year":"2021","unstructured":"Daniel Komaromy . 2018. Unbox Your Phone . https:\/\/medium.com\/taszksec\/unbox-your-phone-part-i-331bbf44c30c Retrieved December 1, 2021 from Daniel Komaromy. 2018. Unbox Your Phone . https:\/\/medium.com\/taszksec\/unbox-your-phone-part-i-331bbf44c30c Retrieved December 1, 2021 from"},{"volume-title":"Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption . https:\/\/bits-please.blogspot.com\/2016\/06\/extracting-qualcomms-keymaster-keys.html Retrieved","year":"2021","key":"e_1_3_2_1_14_1","unstructured":"laginimaineb. 2016a. Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption . https:\/\/bits-please.blogspot.com\/2016\/06\/extracting-qualcomms-keymaster-keys.html Retrieved December 1, 2021 from laginimaineb. 2016a. Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption . https:\/\/bits-please.blogspot.com\/2016\/06\/extracting-qualcomms-keymaster-keys.html Retrieved December 1, 2021 from"},{"volume-title":"TrustZone Kernel Privilege Escalation (CVE-2016--2431) . https:\/\/bits-please.blogspot.com\/2016\/06\/trustzone-kernel-privilege-escalation.html Retrieved","year":"2021","key":"e_1_3_2_1_15_1","unstructured":"laginimaineb. 2016b. TrustZone Kernel Privilege Escalation (CVE-2016--2431) . https:\/\/bits-please.blogspot.com\/2016\/06\/trustzone-kernel-privilege-escalation.html Retrieved December 1, 2021 from laginimaineb. 2016b. TrustZone Kernel Privilege Escalation (CVE-2016--2431) . https:\/\/bits-please.blogspot.com\/2016\/06\/trustzone-kernel-privilege-escalation.html Retrieved December 1, 2021 from"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308755.3308761"},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/www.psacertified.org\/ Retrieved","author":"Limited Arm","year":"2021","unstructured":"Arm Limited . [n.,d.] a. PSA Certified . https:\/\/www.psacertified.org\/ Retrieved December 1, 2021 from Arm Limited. [n.,d.] a. PSA Certified . https:\/\/www.psacertified.org\/ Retrieved December 1, 2021 from"},{"key":"e_1_3_2_1_18_1","volume-title":"PSA Cryptography API 1.0 . https:\/\/documentation-service.arm.com\/static\/5fae7799ca04df4095c1cab0 Retrieved","author":"Limited Arm","year":"2021","unstructured":"Arm Limited . [n.,d.] b. PSA Cryptography API 1.0 . https:\/\/documentation-service.arm.com\/static\/5fae7799ca04df4095c1cab0 Retrieved December 1, 2021 from Arm Limited. [n.,d.] b. PSA Cryptography API 1.0 . https:\/\/documentation-service.arm.com\/static\/5fae7799ca04df4095c1cab0 Retrieved December 1, 2021 from"},{"key":"e_1_3_2_1_19_1","volume-title":"PSA Storage API 1.0 . https:\/\/developer.arm.com\/-\/media\/Files\/pdf\/PlatformSecurityArchitecture\/Implement\/IHI0087-PSA_Storage_API-1.0.0.pdf Retrieved","author":"Limited Arm","year":"2021","unstructured":"Arm Limited . [n.,d.] c. PSA Storage API 1.0 . https:\/\/developer.arm.com\/-\/media\/Files\/pdf\/PlatformSecurityArchitecture\/Implement\/IHI0087-PSA_Storage_API-1.0.0.pdf Retrieved December 1, 2021 from Arm Limited. [n.,d.] c. PSA Storage API 1.0 . https:\/\/developer.arm.com\/-\/media\/Files\/pdf\/PlatformSecurityArchitecture\/Implement\/IHI0087-PSA_Storage_API-1.0.0.pdf Retrieved December 1, 2021 from"},{"key":"e_1_3_2_1_20_1","volume-title":"TrustZone for Cortex-M . https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone\/trustzone-for-cortex-m Retrieved","author":"Limited Arm","year":"2021","unstructured":"Arm Limited . [n.,d.] d. TrustZone for Cortex-M . https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone\/trustzone-for-cortex-m Retrieved December 1, 2021 from Arm Limited. [n.,d.] d. TrustZone for Cortex-M . https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone\/trustzone-for-cortex-m Retrieved December 1, 2021 from"},{"key":"e_1_3_2_1_21_1","volume-title":"Platform Security Model . https:\/\/developer.arm.com\/documentation\/den0128\/0100\/ Retrieved","author":"Limited Arm","year":"2021","unstructured":"Arm Limited . 2021. Platform Security Model . https:\/\/developer.arm.com\/documentation\/den0128\/0100\/ Retrieved December 1, 2021 from Arm Limited. 2021. Platform Security Model . https:\/\/developer.arm.com\/documentation\/den0128\/0100\/ Retrieved December 1, 2021 from"},{"key":"e_1_3_2_1_22_1","volume-title":"https:\/\/www.trustedfirmware.org\/projects\/tf-m\/ Retrieved","author":"Limited Linaro","year":"2021","unstructured":"Linaro Limited . [n.,d.] e. Trusted Firmware M (TF-M) . https:\/\/www.trustedfirmware.org\/projects\/tf-m\/ Retrieved December 1, 2021 from Linaro Limited. [n.,d.] e. Trusted Firmware M (TF-M) . https:\/\/www.trustedfirmware.org\/projects\/tf-m\/ Retrieved December 1, 2021 from"},{"key":"e_1_3_2_1_23_1","unstructured":"OMTP Limited. 2009. Advanced Trusted Environment: OMTP TR1 . http:\/\/www.omtp.org\/OMTP_Advanced_Trusted_Environment_OMTP_TR1_v1_1.pdf Retrieved December 1 2021 from  OMTP Limited. 2009. Advanced Trusted Environment: OMTP TR1 . http:\/\/www.omtp.org\/OMTP_Advanced_Trusted_Environment_OMTP_TR1_v1_1.pdf Retrieved December 1 2021 from"},{"key":"e_1_3_2_1_24_1","volume-title":"29th Euromicro Conference on Real-Time Systems (ECRTS","author":"Lucas Pierre","year":"2017","unstructured":"Pierre Lucas , Kevin Chappuis , Michele Paolino , Nicolas Dagieu , and Daniel Raho . 2017 . Vosysmonitor, a low latency monitor layer for mixed-criticality systems on armv8-a . In 29th Euromicro Conference on Real-Time Systems (ECRTS 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Pierre Lucas, Kevin Chappuis, Michele Paolino, Nicolas Dagieu, and Daniel Raho. 2017. Vosysmonitor, a low latency monitor layer for mixed-criticality systems on armv8-a. In 29th Euromicro Conference on Real-Time Systems (ECRTS 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_25_1","volume-title":"Christopher Kruegel, and Giovanni Vigna.","author":"Machiry Aravind","year":"2017","unstructured":"Aravind Machiry , Eric Gustafson , Chad Spensky , Christopher Salls , Nick Stephens , Ruoyu Wang , Antonio Bianchi , Yung Ryn Choe , Christopher Kruegel, and Giovanni Vigna. 2017 . BOOMERANG : Exploiting the Semantic Gap in Trusted Execution Environments.. In NDSS . Aravind Machiry, Eric Gustafson, Chad Spensky, Christopher Salls, Nick Stephens, Ruoyu Wang, Antonio Bianchi, Yung Ryn Choe, Christopher Kruegel, and Giovanni Vigna. 2017. BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.. In NDSS ."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2016.065"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-01932-1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2014.7005255"},{"key":"e_1_3_2_1_29_1","volume-title":"Towards a TrustZone-assisted hypervisor for real-time embedded systems","author":"Pinto Sandro","year":"2016","unstructured":"Sandro Pinto , Jorge Pereira , Tiago Gomes , Mongkol Ekpanyapong , and Adriano Tavares . 2016. Towards a TrustZone-assisted hypervisor for real-time embedded systems . IEEE computer architecture letters , Vol. 16 , 2 ( 2016 ), 158--161. Sandro Pinto, Jorge Pereira, Tiago Gomes, Mongkol Ekpanyapong, and Adriano Tavares. 2016. Towards a TrustZone-assisted hypervisor for real-time embedded systems. IEEE computer architecture letters , Vol. 16, 2 (2016), 158--161."},{"key":"e_1_3_2_1_30_1","unstructured":"Zephyr Project. 2021. Zephyr Project Documentation .Online. https:\/\/docs.zephyrproject.org\/latest  Zephyr Project. 2021. Zephyr Project Documentation .Online. https:\/\/docs.zephyrproject.org\/latest"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2976747"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484581"},{"volume-title":"29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20) .","author":"Suciu Darius","key":"e_1_3_2_1_34_1","unstructured":"Darius Suciu , Stephen McLaughlin , Laurent Simon , and Radu Sion . 2020. Horizontal Privilege Escalation in Trusted Applications . In 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20) . Darius Suciu, Stephen McLaughlin, Laurent Simon, and Radu Sion. 2020. Horizontal Privilege Escalation in Trusted Applications. In 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20) ."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462633.3483976"},{"key":"e_1_3_2_1_36_1","volume-title":"Marco Aur\u00e9lio Spohn, Danilo Freire de Souza Santos, Angelo Perkusich, and Kyller Costa Gorgonio.","author":"Gomes Valadares Dalton C\u00e9zane","year":"2021","unstructured":"Dalton C\u00e9zane Gomes Valadares , Newton Carlos Will , Marco Aur\u00e9lio Spohn, Danilo Freire de Souza Santos, Angelo Perkusich, and Kyller Costa Gorgonio. 2021 . Trusted Execution Environments for Cloud\/Fog-based Internet of Things Applications.. In CLOSER . 111--121. Dalton C\u00e9zane Gomes Valadares, Newton Carlos Will, Marco Aur\u00e9lio Spohn, Danilo Freire de Souza Santos, Angelo Perkusich, and Kyller Costa Gorgonio. 2021. Trusted Execution Environments for Cloud\/Fog-based Internet of Things Applications.. In CLOSER . 111--121."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.004"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2012.119"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON52354.2021.9491592"},{"key":"e_1_3_2_1_40_1","volume-title":"Daisuke Mashima, Binbin Chen, and Zbigniew Kalbarczyk.","author":"Ye Quanqi","year":"2021","unstructured":"Quanqi Ye , Heng Chuan Tan , Daisuke Mashima, Binbin Chen, and Zbigniew Kalbarczyk. 2021 . Position Paper : On Using Trusted Execution Environment to Secure COTS Devices for Accessing Industrial Control Systems . (2021). Quanqi Ye, Heng Chuan Tan, Daisuke Mashima, Binbin Chen, and Zbigniew Kalbarczyk. 2021. Position Paper: On Using Trusted Execution Environment to Secure COTS Devices for Accessing Industrial Control Systems. (2021)."},{"key":"e_1_3_2_1_41_1","volume-title":"ARMv8-M architecture technical overview. ARM white paper","author":"Yiu Joseph","year":"2015","unstructured":"Joseph Yiu . 2015. ARMv8-M architecture technical overview. ARM white paper ( 2015 ). Joseph Yiu. 2015. ARMv8-M architecture technical overview. ARM white paper (2015)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.23919\/TST.2017.7889643"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 8th ACM on Cyber-Physical System Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494107.3522774","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494107.3522774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:45Z","timestamp":1750188645000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494107.3522774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":42,"alternative-id":["10.1145\/3494107.3522774","10.1145\/3494107"],"URL":"https:\/\/doi.org\/10.1145\/3494107.3522774","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}