{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:10Z","timestamp":1772039470921,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T00:00:00Z","timestamp":1666569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3528535.3531513","type":"proceedings-article","created":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T21:10:50Z","timestamp":1654031450000},"page":"15-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["GuardiaNN"],"prefix":"10.1145","author":[{"given":"Jinwoo","family":"Choi","sequence":"first","affiliation":[{"name":"Yonsei University"}]},{"given":"Jaeyeon","family":"Kim","sequence":"additional","affiliation":[{"name":"Yonsei University"}]},{"given":"Chaemin","family":"Lim","sequence":"additional","affiliation":[{"name":"Yonsei University"}]},{"given":"Suhyun","family":"Lee","sequence":"additional","affiliation":[{"name":"Yonsei University"}]},{"given":"Jinho","family":"Lee","sequence":"additional","affiliation":[{"name":"Yonsei University"}]},{"given":"Dokyung","family":"Song","sequence":"additional","affiliation":[{"name":"Yonsei University"}]},{"given":"Youngsok","family":"Kim","sequence":"additional","affiliation":[{"name":"Yonsei University"}]}],"member":"320","published-online":{"date-parts":[[2022,10,24]]},"reference":[{"key":"e_1_3_2_1_1_2","volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek G. Murray, Benoit Steiner, Paul Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. 2016. TensorFlow: A System for Large-Scale Machine Learning. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (Savannah, GA, USA, November 2\u20134, 2016) (OSDI '16). USENIX Association, 265\u2013283."},{"key":"e_1_3_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"e_1_3_2_1_3_2","unstructured":"Amlogic Inc. 2016. S905 Datasheet. https:\/\/dn.odroid.com\/S905\/DataSheet\/S905_Public_Datasheet_V1.1.4.pdf Retrieved November 20 2021 from"},{"key":"e_1_3_2_1_4_2","volume-title":"Cortex-A7 NEON Media Processing Engine Technical Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0462\/f\/Introduction\/About-the-Cortex-A7-NEON-MPE Retrieved","author":"ARM.","year":"2021","unstructured":"ARM. 2013. Cortex-A7 NEON Media Processing Engine Technical Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0462\/f\/Introduction\/About-the-Cortex-A7-NEON-MPE Retrieved November 20, 2021 from"},{"key":"e_1_3_2_1_5_2","volume-title":"ARM Security Technology: Building a Secure System using TrustZone\u00ae Technology. https:\/\/developer.arm.com\/documentation\/PRD29-GENC-009492\/c\/TrustZone-Hardware-Architecture Retrieved","author":"Limited ARM","year":"2021","unstructured":"ARM Limited. 2009. ARM Security Technology: Building a Secure System using TrustZone\u00ae Technology. https:\/\/developer.arm.com\/documentation\/PRD29-GENC-009492\/c\/TrustZone-Hardware-Architecture Retrieved November 20, 2021 from"},{"key":"e_1_3_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332007"},{"key":"e_1_3_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00061"},{"key":"e_1_3_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388888"},{"key":"e_1_3_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694380"},{"key":"e_1_3_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_11_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym10090387"},{"key":"e_1_3_2_1_12_2","unstructured":"Fuzhou Rockchip Electronics Co. 2017. Rokchip RK3399 TRM Part1. http:\/\/opensource.rock-chips.com\/images\/e\/ee\/Rockchip_RK3399TRM_V1.4_Part1-20170408.pdf Retrieved November 20 2021 from"},{"key":"e_1_3_2_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST51057.2020.9358260"},{"key":"e_1_3_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532769"},{"key":"e_1_3_2_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_16_2","doi-asserted-by":"publisher","unstructured":"Robin C Geyer Tassilo Klein and Moin Nabi. 2018. Differentially private federated learning: A client level perspective. (2018). https:\/\/doi.org\/10.48550\/arXiv.1712.07557 1712.07557","DOI":"10.48550\/arXiv.1712.07557"},{"key":"e_1_3_2_1_17_2","volume-title":"Proceedings of The 33rd International Conference on Machine Learning","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In Proceedings of The 33rd International Conference on Machine Learning (New York, New York, USA, June 19\u201324, 2016) (ICML '16). PMLR, New York, New York, USA, 201\u2013210. https:\/\/proceedings.mlr.press\/v48\/gilad-bachrach16.html"},{"key":"e_1_3_2_1_18_2","volume-title":"TEE Client API Specification (Version 1.0). https:\/\/globalplatform.org\/specs-library\/tee-client-api-specification\/ Retrieved","author":"GlobalPlatform Inc. 2010.","year":"2021","unstructured":"GlobalPlatform Inc. 2010. TEE Client API Specification (Version 1.0). https:\/\/globalplatform.org\/specs-library\/tee-client-api-specification\/ Retrieved November 20, 2021 from"},{"key":"e_1_3_2_1_19_2","volume-title":"TEE Internal Core API Specification (Version v1.1.2). https:\/\/globalplatform.org\/wp-content\/uploads\/2018\/06\/GPD_TEE_Internal_Core_API_Specification_v1.1.2_CC.pdf Retrieved","author":"GlobalPlatform Inc. 2016.","year":"2021","unstructured":"GlobalPlatform Inc. 2016. TEE Internal Core API Specification (Version v1.1.2). https:\/\/globalplatform.org\/wp-content\/uploads\/2018\/06\/GPD_TEE_Internal_Core_API_Specification_v1.1.2_CC.pdf Retrieved November 20, 2021 from"},{"key":"e_1_3_2_1_20_2","volume-title":"https:\/\/www.tensorflow.org\/lite Retrieved","author":"TensorFlow Google LLC.","year":"2021","unstructured":"Google LLC. 2021. TensorFlow Lite | ML for Mobile and Edge Devices. https:\/\/www.tensorflow.org\/lite Retrieved November 20, 2021 from"},{"key":"e_1_3_2_1_21_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1807.00969"},{"key":"e_1_3_2_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_3_2_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886573"},{"key":"e_1_3_2_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_25_2","doi-asserted-by":"publisher","unstructured":"Andrew G. Howard Menglong Zhu Bo Chen Dmitry Kalenichenko Weijun Wang Tobias Weyand Marco Andreetto and Hartwig Adam. 2017. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications. (2017). https:\/\/doi.org\/10.48550\/arXiv.1704.04861 1704.04861","DOI":"10.48550\/arXiv.1704.04861"},{"key":"e_1_3_2_1_26_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1803.05961"},{"key":"e_1_3_2_1_27_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1807.06689"},{"key":"e_1_3_2_1_28_2","volume-title":"Intel Software Guard Extensions: Developer Guide. https:\/\/download.01.org\/intel-sgx\/linux-1.7\/docs\/Intel_SGX_Developer_Guide.pdf Retrieved","author":"Intel Corporation","year":"2021","unstructured":"Intel Corporation. 2016. Intel Software Guard Extensions: Developer Guide. https:\/\/download.01.org\/intel-sgx\/linux-1.7\/docs\/Intel_SGX_Developer_Guide.pdf Retrieved November 20, 2021 from"},{"key":"e_1_3_2_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00286"},{"key":"e_1_3_2_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3389023"},{"key":"e_1_3_2_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3361525.3361538"},{"key":"e_1_3_2_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3446382.3448606"},{"key":"e_1_3_2_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3468220"},{"key":"e_1_3_2_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3423211.3425677"},{"key":"e_1_3_2_1_35_2","volume-title":"Advances in Neural Information Processing Systems (Lake Tahoe, Nevada, December 3\u20136","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems (Lake Tahoe, Nevada, December 3\u20136, 2012) (NIPS '12), F. Pereira, C.J. Burges, L. Bottou, and K.Q. Weinberger (Eds.). Curran Associates, Inc., 84\u201390. https:\/\/proceedings.neurips.cc\/paper\/2012\/file\/c399862d3b9d6b76c8436e924a68c45b-Paper.pdf"},{"key":"e_1_3_2_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483554"},{"key":"e_1_3_2_1_37_2","doi-asserted-by":"publisher","unstructured":"Fengfu Li and Bin Liu. 2016. Ternary Weight Networks. (2016). https:\/\/doi.org\/10.48550\/arXiv.1605.04711 1605.04711","DOI":"10.48550\/arXiv.1605.04711"},{"key":"e_1_3_2_1_38_2","volume-title":"Open Portable Trusted Execution Environment. https:\/\/www.op-tee.org\/ Retrieved","author":"Limited Linaro","year":"2021","unstructured":"Linaro Limited. 2021. Open Portable Trusted Execution Environment. https:\/\/www.op-tee.org\/ Retrieved November 20, 2021 from"},{"key":"e_1_3_2_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.28"},{"key":"e_1_3_2_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3361525.3361532"},{"key":"e_1_3_2_1_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.2988525"},{"key":"e_1_3_2_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299155"},{"key":"e_1_3_2_1_44_2","doi-asserted-by":"publisher","unstructured":"H. Brendan McMahan Daniel Ramage Kunal Talwar and Li Zhang. 2017. Learning differentially private recurrent language models. (2017). https:\/\/doi.org\/10.48550\/arXiv.1710.06963 1710.06963","DOI":"10.48550\/arXiv.1710.06963"},{"key":"e_1_3_2_1_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466628"},{"key":"e_1_3_2_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388946"},{"key":"e_1_3_2_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_48_2","unstructured":"Monsoon Solutions Inc. 2019. Mobile Device Power Monitor Manual Ver 1.20. http:\/\/msoon.github.io\/powermonitor\/PowerTool\/doc\/Power%20Monitor%20Manual.pdf Retrieved November 20 2021 from"},{"key":"e_1_3_2_1_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_23"},{"key":"e_1_3_2_1_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"e_1_3_2_1_51_2","volume-title":"LXDs: Towards Isolation of Kernel Subsystems. In 2019 USENIX Annual Technical Conference","author":"Narayanan Vikram","year":"2019","unstructured":"Vikram Narayanan, Abhiram Balasubramanian, Charlie Jacobsen, Sarah Spall, Scott Bauer, Michael Quigley, Aftab Hussain, Abdullah Younis, Junjie Shen, Moinak Bhattacharyya, and Anton Burtsev. 2019. LXDs: Towards Isolation of Kernel Subsystems. In 2019 USENIX Annual Technical Conference (Renton, WA, July 10\u2013-12, 2019) (ATC '19). USENIX Association, 269\u2013284. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/narayanan"},{"key":"e_1_3_2_1_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_53_2","volume-title":"i.MX 6Dual\/6Quad Applications Processors for Consumer Products. https:\/\/www.nxp.com\/docs\/en\/data-sheet\/IMX6DQCEC.pdf Retrieved","author":"Semiconductors NXP","year":"2021","unstructured":"NXP Semiconductors. 2018. i.MX 6Dual\/6Quad Applications Processors for Consumer Products. https:\/\/www.nxp.com\/docs\/en\/data-sheet\/IMX6DQCEC.pdf Retrieved November 20, 2021 from"},{"key":"e_1_3_2_1_54_2","volume-title":"Oblivious Multi-Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko, Felix Schuster, Cedric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium (Austin, TX, August 16\u201318, 2016) (USENIX Security '16). USENIX Association, 619\u2013636. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/ohrimenko"},{"key":"e_1_3_2_1_55_2","volume-title":"CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves. In 2019 USENIX Annual Technical Conference","author":"Orenbach Meni","year":"2019","unstructured":"Meni Orenbach, Yan Michalevsky, Christof Fetzer, and Mark Silberstein. 2019. CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves. In 2019 USENIX Annual Technical Conference (Renton, WA, July 10\u2013-12, 2019) (ATC '19). USENIX Association, 555\u2013570. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/orenbach"},{"key":"e_1_3_2_1_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467887"},{"key":"e_1_3_2_1_57_2","volume-title":"2019 USENIX Annual Technical Conference","author":"Park Heejin","year":"2019","unstructured":"Heejin Park, Shuang Zhai, Long Lu, and Felix Xiaozhu Lin. 2019. StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone. In 2019 USENIX Annual Technical Conference (Renton, WA, July 10\u2013-12, 2019) (ATC '19). USENIX Association, 537\u2013554. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/park-heejin"},{"key":"e_1_3_2_1_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM50583.2021.9439113"},{"key":"e_1_3_2_1_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"e_1_3_2_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"e_1_3_2_1_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3423211.3425687"},{"key":"e_1_3_2_1_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388939"},{"key":"e_1_3_2_1_63_2","volume-title":"https:\/\/pjreddie.com\/darknet\/tiny-darknet\/ Retrieved","author":"Redmon Joseph Chet","year":"2021","unstructured":"Joseph Chet Redmon. 2018. Tiny Darknet. https:\/\/pjreddie.com\/darknet\/tiny-darknet\/ Retrieved November 20, 2021 from"},{"key":"e_1_3_2_1_64_2","volume-title":"2021 USENIX Annual Technical Conference (Virtual, July 14\u2013-16","author":"Ren Yanjing","year":"2021","unstructured":"Yanjing Ren, Jingwei Li, Zuoru Yang, Patrick P. C. Lee, and Xiaosong Zhang. 2021. Accelerating Encrypted Deduplication via SGX. In 2021 USENIX Annual Technical Conference (Virtual, July 14\u2013-16, 2021) (ATC '21). USENIX Association, 957\u2013971. https:\/\/www.usenix.org\/conference\/atc21\/presentation\/ren-yanjing"},{"key":"e_1_3_2_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_1_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEM48762.2020.9160286"},{"key":"e_1_3_2_1_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326072"},{"key":"e_1_3_2_1_68_2","volume-title":"RM0436 Reference manual: STM32MP157 advanced Arm\u00ae-based 32-bit MPUs. https:\/\/www.st.com\/resource\/en\/reference_manual\/DM00327659-.pdf Retrieved","year":"2021","unstructured":"STMicroelectronics. 2021. RM0436 Reference manual: STM32MP157 advanced Arm\u00ae-based 32-bit MPUs. https:\/\/www.st.com\/resource\/en\/reference_manual\/DM00327659-.pdf Retrieved November 20, 2021 from"},{"key":"e_1_3_2_1_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.244"},{"key":"e_1_3_2_1_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2761740"},{"key":"e_1_3_2_1_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"e_1_3_2_1_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467962"},{"key":"e_1_3_2_1_73_2","volume-title":"https:\/\/www.libtom.net\/LibTomCrypt\/ Retrieved","author":"LibTomCrypt Team","year":"2021","unstructured":"Team libtom. 2020. LibTomCrypt. https:\/\/www.libtom.net\/LibTomCrypt\/ Retrieved November 20, 2021 from"},{"key":"e_1_3_2_1_74_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1806.03287"},{"key":"e_1_3_2_1_75_2","volume-title":"https:\/\/optee.readthedocs.io\/en\/latest\/index.html Retrieved","author":"Documentation OP-TEE","year":"2021","unstructured":"TrustedFirmware.org. 2021. OP-TEE Documentation. https:\/\/optee.readthedocs.io\/en\/latest\/index.html Retrieved November 20, 2021 from"},{"key":"e_1_3_2_1_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS46320.2019.00042"},{"key":"e_1_3_2_1_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326094"},{"key":"e_1_3_2_1_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.10"},{"key":"e_1_3_2_1_79_2","doi-asserted-by":"publisher","DOI":"10.1155\/2019"},{"key":"e_1_3_2_1_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.13"},{"key":"e_1_3_2_1_81_2","volume-title":"Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses","author":"Zhao Shijun","year":"2019","unstructured":"Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, and Dengguo Feng. 2019. Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks. In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (Beijing, China, September 23\u201325, 2019) (RAID '19). USENIX Association, 105\u2013120. https:\/\/www.usenix.org\/conference\/raid2019\/presentation\/zhao"},{"key":"e_1_3_2_1_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.411"}],"event":{"name":"Middleware '22: 23rd International Middleware Conference","location":"Quebec QC Canada","acronym":"Middleware '22","sponsor":["ACM Association for Computing Machinery","IFIP"]},"container-title":["Proceedings of the 23rd ACM\/IFIP International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3528535.3531513","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3528535.3531513","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:43Z","timestamp":1750186963000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3528535.3531513"}},"subtitle":["Fast and Secure On-Device Inference in TrustZone Using Embedded SRAM and Cryptographic Hardware"],"short-title":[],"issued":{"date-parts":[[2022,10,24]]},"references-count":82,"alternative-id":["10.1145\/3528535.3531513","10.1145\/3528535"],"URL":"https:\/\/doi.org\/10.1145\/3528535.3531513","relation":{},"subject":[],"published":{"date-parts":[[2022,10,24]]},"assertion":[{"value":"2022-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}