{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:45:35Z","timestamp":1773193535795,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":93,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Research Institute for Artificial Intelligence of Things, The Hong Kong Polytechnic University, HK RGC General Research Fund","award":["No. PolyU 15220020"],"award-info":[{"award-number":["No. PolyU 15220020"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grant No. 62002151 and No. 62102175"],"award-info":[{"award-number":["Grant No. 62002151 and No. 62102175"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"HK RGC Collaborative Research Fund","award":["No. C-5491"],"award-info":[{"award-number":["No. C-5491"]}]},{"DOI":"10.13039\/501100010877","name":"Science, Technology and Innovation Commission of Shenzhen Municipality","doi-asserted-by":"publisher","award":["Grant No. SGDX20201103095408029"],"award-info":[{"award-number":["Grant No. SGDX20201103095408029"]}],"id":[{"id":"10.13039\/501100010877","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560627","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"769-783","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["StrongBox"],"prefix":"10.1145","author":[{"given":"Yunjie","family":"Deng","sequence":"first","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]},{"given":"Chenxu","family":"Wang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology &amp; The Hong Kong Polytechnic University, Shenzhen, Hong Kong, China"}]},{"given":"Shunchang","family":"Yu","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]},{"given":"Shiqing","family":"Liu","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]},{"given":"Zhenyu","family":"Ning","sequence":"additional","affiliation":[{"name":"Hunan University, Southern University of Science and Technology, Changsha, Shenzhen, China"}]},{"given":"Kevin","family":"Leach","sequence":"additional","affiliation":[{"name":"Vanderbilt University, Nashville, TN, USA"}]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[{"name":"Guangzhou University, Guangzhou, China"}]},{"given":"Shoumeng","family":"Yan","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}]},{"given":"Zhengyu","family":"He","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}]},{"given":"Jiannong","family":"Cao","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AlDanial. 2021. cloc. https:\/\/github.com\/AlDanial\/cloc.  AlDanial. 2021. cloc. https:\/\/github.com\/AlDanial\/cloc."},{"key":"e_1_3_2_1_2_1","unstructured":"AMD. 2022. AMD Secure Encrypted Virtualization (SEV). https:\/\/developer.amd. com\/sev\/.  AMD. 2022. AMD Secure Encrypted Virtualization (SEV). https:\/\/developer.amd. com\/sev\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Amlogic Inc. 2016. S905 Datasheet. https:\/\/dn.odroid.com\/S905\/DataSheet\/S905_ Public_Datasheet_V1.1.4.pdf.  Amlogic Inc. 2016. S905 Datasheet. https:\/\/dn.odroid.com\/S905\/DataSheet\/S905_ Public_Datasheet_V1.1.4.pdf."},{"key":"e_1_3_2_1_4_1","unstructured":"Apple. 2022. Discover Metal enhancements for A14 Bionic. https:\/\/developer. apple.com\/videos\/play\/tech-talks\/10858\/.  Apple. 2022. Discover Metal enhancements for A14 Bionic. https:\/\/developer. apple.com\/videos\/play\/tech-talks\/10858\/."},{"key":"e_1_3_2_1_5_1","unstructured":"ARM. 2009. ARM Security Technology Building a Secure System using TrustZone Technology. https:\/\/developer.arm.com\/documentation\/PRD29-GENC-009492\/ latest\/.  ARM. 2009. ARM Security Technology Building a Secure System using TrustZone Technology. https:\/\/developer.arm.com\/documentation\/PRD29-GENC-009492\/ latest\/."},{"key":"e_1_3_2_1_6_1","unstructured":"ARM. 2013. ARM Generic Interrupt Controller Architecture Specification version 2.0. https:\/\/developer.arm.com\/documentation\/ihi0048\/latest.  ARM. 2013. ARM Generic Interrupt Controller Architecture Specification version 2.0. https:\/\/developer.arm.com\/documentation\/ihi0048\/latest."},{"key":"e_1_3_2_1_7_1","unstructured":"ARM. 2016. Juno r2 ARM Development Platform SoC. https:\/\/developer.arm. com\/documentation\/ddi0515\/latest.  ARM. 2016. Juno r2 ARM Development Platform SoC. https:\/\/developer.arm. com\/documentation\/ddi0515\/latest."},{"key":"e_1_3_2_1_8_1","unstructured":"ARM. 2017. Midgard Architecture. https:\/\/gitlab.freedesktop.org\/panfrost\/maliisa- docs\/-\/blob\/master\/Midgard.md.  ARM. 2017. Midgard Architecture. https:\/\/gitlab.freedesktop.org\/panfrost\/maliisa- docs\/-\/blob\/master\/Midgard.md."},{"key":"e_1_3_2_1_9_1","unstructured":"Arm. 2019. Arm Mali GPU Best Practices Developer Guide. https:\/\/documentation-service.arm.com\/static\/5e8e117388295d1e18d34ac9?token=.  Arm. 2019. Arm Mali GPU Best Practices Developer Guide. https:\/\/documentation-service.arm.com\/static\/5e8e117388295d1e18d34ac9?token=."},{"key":"e_1_3_2_1_10_1","unstructured":"ARM. 2021. Granule Protection Tables in TF-A. https:\/\/www.trustedfirmware. org\/docs\/tfa_tech_forum_2021_10_21_gpt.pdf.  ARM. 2021. Granule Protection Tables in TF-A. https:\/\/www.trustedfirmware. org\/docs\/tfa_tech_forum_2021_10_21_gpt.pdf."},{"key":"e_1_3_2_1_11_1","unstructured":"ARM. 2021. Mali-G78 GPUs Valhall instruction set documentation released after reverse-engineering work. https:\/\/www.cnx-software.com\/2021\/07\/23\/mali-g78-gpu-valhall-instruction-set-documentation-reverse-engineering\/.  ARM. 2021. Mali-G78 GPUs Valhall instruction set documentation released after reverse-engineering work. https:\/\/www.cnx-software.com\/2021\/07\/23\/mali-g78-gpu-valhall-instruction-set-documentation-reverse-engineering\/."},{"key":"e_1_3_2_1_12_1","unstructured":"ARM. 2022. Arm Cortex-A53 MPCore Processor Technical Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0500\/latest\/.  ARM. 2022. Arm Cortex-A53 MPCore Processor Technical Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0500\/latest\/."},{"key":"e_1_3_2_1_13_1","unstructured":"ARM. 2022. Arm Cortex-A57 MPCore Processor Technical Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0488\/latest\/.  ARM. 2022. Arm Cortex-A57 MPCore Processor Technical Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0488\/latest\/."},{"key":"e_1_3_2_1_14_1","unstructured":"ARM. 2022. Arm Cortex-A72 MPCore Processor Technical Reference Manual. https:\/\/developer.arm.com\/documentation\/100095\/latest\/.  ARM. 2022. Arm Cortex-A72 MPCore Processor Technical Reference Manual. https:\/\/developer.arm.com\/documentation\/100095\/latest\/."},{"key":"e_1_3_2_1_15_1","unstructured":"ARM. 2022. ARM Mali-T600 Series GPU OpenCL Developer Guide. https: \/\/developer.arm.com\/documentation\/dui0538\/latest\/.  ARM. 2022. ARM Mali-T600 Series GPU OpenCL Developer Guide. https: \/\/developer.arm.com\/documentation\/dui0538\/latest\/."},{"key":"e_1_3_2_1_16_1","unstructured":"ARM. 2022. Cortex-A7 MPCore Technical Reference Manual. https:\/\/developer. arm.com\/documentation\/ddi0464\/latest\/.  ARM. 2022. Cortex-A7 MPCore Technical Reference Manual. https:\/\/developer. arm.com\/documentation\/ddi0464\/latest\/."},{"key":"e_1_3_2_1_17_1","unstructured":"ARM. 2022. Game engine guides. https:\/\/developer.arm.com\/solutions\/graphicsand- gaming\/developer-guides\/game-engine-guides.  ARM. 2022. Game engine guides. https:\/\/developer.arm.com\/solutions\/graphicsand- gaming\/developer-guides\/game-engine-guides."},{"key":"e_1_3_2_1_18_1","unstructured":"ARM. 2022. Mali Texture Compression Tool. https:\/\/developer.arm.com\/toolsand- software\/graphics-and-gaming\/mali-texture-compression-tool.  ARM. 2022. Mali Texture Compression Tool. https:\/\/developer.arm.com\/toolsand- software\/graphics-and-gaming\/mali-texture-compression-tool."},{"key":"e_1_3_2_1_19_1","unstructured":"ARM. 2022. Open Source Mali Midgard GPU Kernel Drivers. https:\/\/developer.arm.com\/tools-and-software\/graphics-and-gaming\/malidrivers\/ midgard-kernel.  ARM. 2022. Open Source Mali Midgard GPU Kernel Drivers. https:\/\/developer.arm.com\/tools-and-software\/graphics-and-gaming\/malidrivers\/ midgard-kernel."},{"key":"e_1_3_2_1_20_1","unstructured":"ARM. 2022. OpenCL. https:\/\/developer.arm.com\/tools-and-software\/graphicsand- gaming\/mali-drivers\/user-space.  ARM. 2022. OpenCL. https:\/\/developer.arm.com\/tools-and-software\/graphicsand- gaming\/mali-drivers\/user-space."},{"key":"e_1_3_2_1_21_1","unstructured":"ARM. 2022. TRUSTZONE FOR CORTEX-A. https:\/\/www.arm.com\/technologies\/trustzone-for-cortex-a.  ARM. 2022. TRUSTZONE FOR CORTEX-A. https:\/\/www.arm.com\/technologies\/trustzone-for-cortex-a."},{"key":"e_1_3_2_1_22_1","unstructured":"ARM. 2022. VR best practice. https:\/\/developer.arm.com\/solutions\/graphics-andgaming\/ developer-guides\/vr-best-practice.  ARM. 2022. VR best practice. https:\/\/developer.arm.com\/solutions\/graphics-andgaming\/ developer-guides\/vr-best-practice."},{"key":"e_1_3_2_1_23_1","unstructured":"ASUS IoT. 2022. ASUS IoT Face Recognition Edge AI Dev Kit. https:\/\/iot.asus. com\/solutions\/facerecognition\/.  ASUS IoT. 2022. ASUS IoT Face Recognition Edge AI Dev Kit. https:\/\/iot.asus. com\/solutions\/facerecognition\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2015.17"},{"key":"e_1_3_2_1_25_1","volume-title":"Blazeface: Sub-millisecond neural face detection on mobile gpus. arXiv preprint arXiv:1907.05047","author":"Bazarevsky Valentin","year":"2019","unstructured":"Valentin Bazarevsky , Yury Kartynnik , Andrey Vakunov , Karthik Raveendran , and Matthias Grundmann . 2019 . Blazeface: Sub-millisecond neural face detection on mobile gpus. arXiv preprint arXiv:1907.05047 (2019). Valentin Bazarevsky, Yury Kartynnik, Andrey Vakunov, Karthik Raveendran, and Matthias Grundmann. 2019. Blazeface: Sub-millisecond neural face detection on mobile gpus. arXiv preprint arXiv:1907.05047 (2019)."},{"key":"e_1_3_2_1_26_1","volume-title":"SANCTUARY: ARMing TrustZone with User-space Enclaves.. In NDSS.","author":"Brasser Ferdinand","year":"2019","unstructured":"Ferdinand Brasser , David Gens , Patrick Jauernig , Ahmad-Reza Sadeghi , and Emmanuel Stapf . 2019 . SANCTUARY: ARMing TrustZone with User-space Enclaves.. In NDSS. Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2019. SANCTUARY: ARMing TrustZone with User-space Enclaves.. In NDSS."},{"key":"e_1_3_2_1_27_1","unstructured":"BYTE Magazine. 2022. Linux\/unix nbench. http:\/\/www.tux.org\/~mayer\/linux\/ bmark.html.  BYTE Magazine. 2022. Linux\/unix nbench. http:\/\/www.tux.org\/~mayer\/linux\/ bmark.html."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3089801.3089804"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2881425"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2009.5306797"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490301.2451145"},{"key":"e_1_3_2_1_32_1","volume-title":"Guardia NN: Fast and Secure On-Device Inference in TrustZone Using Embedded SRAM and Cryptographic Hardware.","author":"Choi Jinwoo","year":"2022","unstructured":"Jinwoo Choi , Jaeyeon Kim , Chaemin Lim , Suhyun Lee , Jinho Lee , Dokyung Song , and Youngsok Kim . 2022 . Guardia NN: Fast and Secure On-Device Inference in TrustZone Using Embedded SRAM and Cryptographic Hardware. (2022). Jinwoo Choi, Jaeyeon Kim, Chaemin Lim, Suhyun Lee, Jinho Lee, Dokyung Song, and Youngsok Kim. 2022. Guardia NN: Fast and Secure On-Device Inference in TrustZone Using Embedded SRAM and Cryptographic Hardware. (2022)."},{"key":"e_1_3_2_1_33_1","first-page":"1","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptol. ePrint Arch. 2016 , 86 (2016), 1 -- 118 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. 2016, 86 (2016), 1--118.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_34_1","unstructured":"CVE. 2020. CVE-2020--5991. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2020--5991.  CVE. 2020. CVE-2020--5991. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2020--5991."},{"key":"e_1_3_2_1_35_1","unstructured":"CVE. 2021. CVE-2021--1093. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2021-1093.  CVE. 2021. CVE-2021--1093. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2021-1093."},{"key":"e_1_3_2_1_36_1","unstructured":"CVE. 2021. CVE-2021-1121. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2021-1121.  CVE. 2021. CVE-2021-1121. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2021-1121."},{"key":"e_1_3_2_1_37_1","unstructured":"CVE. 2022. CVE-2022-21815. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2022-21815.  CVE. 2022. CVE-2022-21815. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2022-21815."},{"key":"e_1_3_2_1_38_1","unstructured":"CVE. 2022. CVE-2022-21821. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2022-21821.  CVE. 2022. CVE-2022-21821. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2022-21821."},{"key":"e_1_3_2_1_39_1","unstructured":"Eklektix Inc. 2021. A deep dive into cma. https:\/\/lwn.net\/Articles\/486301\/.  Eklektix Inc. 2021. A deep dive into cma. https:\/\/lwn.net\/Articles\/486301\/."},{"key":"e_1_3_2_1_40_1","unstructured":"FuZhou Rockchip Electronics Co. Ltd. 2017. Rockchip RK3288 Technical Reference Manual Part1. http:\/\/opensource.rock-chips.com\/images\/8\/8f\/Rockchip_ RK3288_TRM_V1.2_Part1-20170321.pdf.  FuZhou Rockchip Electronics Co. Ltd. 2017. Rockchip RK3288 Technical Reference Manual Part1. http:\/\/opensource.rock-chips.com\/images\/8\/8f\/Rockchip_ RK3288_TRM_V1.2_Part1-20170321.pdf."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318170.3319372"},{"key":"e_1_3_2_1_42_1","unstructured":"Google. 2022. GPUs on Compute Engine. https:\/\/cloud.google.com\/compute\/docs\/gpus\/.  Google. 2022. GPUs on Compute Engine. https:\/\/cloud.google.com\/compute\/docs\/gpus\/."},{"key":"e_1_3_2_1_43_1","unstructured":"S Heymann K M\u00fcller A Smolic B Froehlich and T Wiegand. 2007. SIFT implementation and optimization for general-purpose GPU. (2007).  S Heymann K M\u00fcller A Smolic B Froehlich and T Wiegand. 2007. SIFT implementation and optimization for general-purpose GPU. (2007)."},{"key":"e_1_3_2_1_44_1","volume-title":"PACSafe: Leveraging ARM Pointer Authentication for Memory Safety in C\/C. arXiv preprint arXiv:2202.08669","author":"Hohentanner Konrad","year":"2022","unstructured":"Konrad Hohentanner , Philipp Zieris , and Julian Horsch . 2022. PACSafe: Leveraging ARM Pointer Authentication for Memory Safety in C\/C. arXiv preprint arXiv:2202.08669 ( 2022 ). Konrad Hohentanner, Philipp Zieris, and Julian Horsch. 2022. PACSafe: Leveraging ARM Pointer Authentication for Memory Safety in C\/C. arXiv preprint arXiv:2202.08669 (2022)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303949"},{"key":"e_1_3_2_1_46_1","volume-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861","author":"Howard Andrew G","year":"2017","unstructured":"Andrew G Howard , Menglong Zhu , Bo Chen , Dmitry Kalenichenko , Weijun Wang , Tobias Weyand , Marco Andreetto , and Hartwig Adam . 2017 . Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 (2017). Andrew G Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig Adam. 2017. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 (2017)."},{"key":"e_1_3_2_1_47_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Hua Zhichao","year":"2017","unstructured":"Zhichao Hua , Jinyu Gu , Yubin Xia , Haibo Chen , Binyu Zang , and Haibing Guan . 2017 . vtz: Virtualizing ARM trustzone . In 26th USENIX Security Symposium (USENIX Security 17) . 541--556. Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, and Haibing Guan. 2017. vtz: Virtualizing ARM trustzone. In 26th USENIX Security Symposium (USENIX Security 17). 541--556."},{"key":"e_1_3_2_1_48_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Hunt Tyler","year":"2020","unstructured":"Tyler Hunt , Zhipeng Jia , Vance Miller , Ariel Szekely , Yige Hu , Christopher J Rossbach , and Emmett Witchel . 2020 . Telekine: Secure computing with cloud gpus . In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) . 817--833. Tyler Hunt, Zhipeng Jia, Vance Miller, Ariel Szekely, Yige Hu, Christopher J Rossbach, and Emmett Witchel. 2020. Telekine: Secure computing with cloud gpus. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 817--833."},{"key":"e_1_3_2_1_49_1","volume-title":"SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and 0.5 MB model size. arXiv preprint arXiv:1602.07360","author":"Iandola Forrest N","year":"2016","unstructured":"Forrest N Iandola , Song Han , Matthew W Moskewicz , Khalid Ashraf , William J Dally , and Kurt Keutzer . 2016. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and 0.5 MB model size. arXiv preprint arXiv:1602.07360 ( 2016 ). Forrest N Iandola, Song Han, Matthew W Moskewicz, Khalid Ashraf, William J Dally, and Kurt Keutzer. 2016. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and 0.5 MB model size. arXiv preprint arXiv:1602.07360 (2016)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.142"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304021"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Jin Soo Jang Sunjune Kong Minsu Kim Daegyeong Kim and Brent Byunghoon Kang. 2015. SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment.. In NDSS.  Jin Soo Jang Sunjune Kong Minsu Kim Daegyeong Kim and Brent Byunghoon Kang. 2015. SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment.. In NDSS.","DOI":"10.14722\/ndss.2015.23189"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538948"},{"key":"e_1_3_2_1_54_1","volume-title":"2012 USENIX Annual Technical Conference (USENIX ATC 12)","author":"Kato Shinpei","year":"2012","unstructured":"Shinpei Kato , Michael McThrow , Carlos Maltzahn , and Scott Brandt . 2012 . Gdev: First-class GPU resource management in the operating system . In 2012 USENIX Annual Technical Conference (USENIX ATC 12) . 401--412. Shinpei Kato, Michael McThrow, Carlos Maltzahn, and Scott Brandt. 2012. Gdev: First-class GPU resource management in the operating system. In 2012 USENIX Annual Technical Conference (USENIX ATC 12). 401--412."},{"key":"e_1_3_2_1_55_1","volume-title":"SecureFL: Privacy Preserving Federated Learning with SGX and TrustZone. In 2021 IEEE\/ACM Symposium on Edge Computing (SEC). IEEE, 55--67","author":"Kuznetsov Eugene","year":"2021","unstructured":"Eugene Kuznetsov , Yitao Chen , and Ming Zhao . 2021 . SecureFL: Privacy Preserving Federated Learning with SGX and TrustZone. In 2021 IEEE\/ACM Symposium on Edge Computing (SEC). IEEE, 55--67 . Eugene Kuznetsov, Yitao Chen, and Ming Zhao. 2021. SecureFL: Privacy Preserving Federated Learning with SGX and TrustZone. In 2021 IEEE\/ACM Symposium on Edge Computing (SEC). IEEE, 55--67."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.12.052"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2973801"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2988251"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2018.00029"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469116.3470014"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483554"},{"key":"e_1_3_2_1_63_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Liljestrand Hans","year":"2019","unstructured":"Hans Liljestrand , Thomas Nyman , Kui Wang , Carlos Chinea Perez , Jan-Erik Ekberg , and N Asokan . 2019 . PAC it up: Towards pointer integrity using ARM pointer authentication . In 28th USENIX Security Symposium (USENIX Security 19) . 177--194. Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, and N Asokan. 2019. PAC it up: Towards pointer integrity using ARM pointer authentication. In 28th USENIX Security Symposium (USENIX Security 19). 177--194."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450268.3453524"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPC.2007.4728256"},{"key":"e_1_3_2_1_66_1","unstructured":"Mesa 3D. 2022. The Mesa 3D Graphics Library. https:\/\/www.mesa3d.org\/.  Mesa 3D. 2022. The Mesa 3D Graphics Library. https:\/\/www.mesa3d.org\/."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3389027"},{"key":"e_1_3_2_1_68_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Mishra Pratyush","year":"2020","unstructured":"Pratyush Mishra , Ryan Lehmkuhl , Akshayaram Srinivasan , Wenting Zheng , and Raluca Ada Popa . 2020 . Delphi: A cryptographic inference service for neural networks . In 29th USENIX Security Symposium (USENIX Security 20) . 2505--2522. Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca Ada Popa. 2020. Delphi: A cryptographic inference service for neural networks. In 29th USENIX Security Symposium (USENIX Security 20). 2505--2522."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964179.1964193"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388946"},{"key":"e_1_3_2_1_71_1","volume-title":"GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Ng Lucien KL","year":"2021","unstructured":"Lucien KL Ng and Sherman SM Chow . 2021 . GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference. In 30th USENIX Security Symposium (USENIX Security 21) . 2147--2164. Lucien KL Ng and Sherman SM Chow. 2021. GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference. In 30th USENIX Security Symposium (USENIX Security 21). 2147--2164."},{"key":"e_1_3_2_1_72_1","unstructured":"NVIDIA. 2022. CUDA Toolkit. https:\/\/developer.nvidia.com\/cuda-toolkit.  NVIDIA. 2022. CUDA Toolkit. https:\/\/developer.nvidia.com\/cuda-toolkit."},{"key":"e_1_3_2_1_73_1","unstructured":"NVIDIA. 2022. NVIDIA CONFIDENTIAL COMPUTING. https:\/\/www.nvidia.com\/en-us\/data-center\/solutions\/confidential-computing\/.  NVIDIA. 2022. NVIDIA CONFIDENTIAL COMPUTING. https:\/\/www.nvidia.com\/en-us\/data-center\/solutions\/confidential-computing\/."},{"key":"e_1_3_2_1_74_1","unstructured":"NVIDIA. 2022. NVIDIA DATA CENTER GPUs. https:\/\/www.nvidia.com\/enus\/data-center\/data-center-gpus\/.  NVIDIA. 2022. NVIDIA DATA CENTER GPUs. https:\/\/www.nvidia.com\/enus\/data-center\/data-center-gpus\/."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1107\/S160057751400023X"},{"key":"e_1_3_2_1_76_1","unstructured":"Pytorch. 2022. Learning PyTorch with Examples. https:\/\/pytorch.org\/tutorials\/beginner\/pytorch_with_examples.html.  Pytorch. 2022. Learning PyTorch with Examples. https:\/\/pytorch.org\/tutorials\/beginner\/pytorch_with_examples.html."},{"key":"e_1_3_2_1_77_1","unstructured":"Qualcomm. 2022. Adreno Graphics Processing Units. https:\/\/developer.qualcomm.com\/software\/adreno-gpu-sdk\/gpu\/.  Qualcomm. 2022. Adreno Graphics Processing Units. https:\/\/developer.qualcomm.com\/software\/adreno-gpu-sdk\/gpu\/."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.09.005"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_2_1_81_1","volume-title":"Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. 1310--1321","author":"Shokri Reza","year":"2015","unstructured":"Reza Shokri and Vitaly Shmatikov . 2015 . Privacy-preserving deep learning . In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. 1310--1321 . Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. 1310--1321."},{"key":"e_1_3_2_1_82_1","unstructured":"STMicroelectronics. 2022. Artificial Intelligence (AI) face recognition function pack for STM32Cube. https:\/\/www.st.com\/en\/embedded-software\/fp-ai-facerec. html.  STMicroelectronics. 2022. Artificial Intelligence (AI) face recognition function pack for STM32Cube. https:\/\/www.st.com\/en\/embedded-software\/fp-ai-facerec. html."},{"key":"e_1_3_2_1_83_1","unstructured":"STMicroelectronics. 2022. GPU device tree configuration. https:\/\/wiki.st.com\/ stm32mpu\/wiki\/GPU_device_tree_configuration.  STMicroelectronics. 2022. GPU device tree configuration. https:\/\/wiki.st.com\/ stm32mpu\/wiki\/GPU_device_tree_configuration."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813692"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.11"},{"key":"e_1_3_2_1_86_1","volume-title":"CRYPTGPU: Fast Privacy-Preserving Machine Learning on the GPU. arXiv preprint arXiv:2104.10949","author":"Tan Sijun","year":"2021","unstructured":"Sijun Tan , Brian Knott , Yuan Tian , and David J Wu . 2021 . CRYPTGPU: Fast Privacy-Preserving Machine Learning on the GPU. arXiv preprint arXiv:2104.10949 (2021). Sijun Tan, Brian Knott, Yuan Tian, and David J Wu. 2021. CRYPTGPU: Fast Privacy-Preserving Machine Learning on the GPU. arXiv preprint arXiv:2104.10949 (2021)."},{"key":"e_1_3_2_1_87_1","unstructured":"Tensorflow. 2022. Use a GPU. https:\/\/www.tensorflow.org\/guide\/gpu.  Tensorflow. 2022. Use a GPU. https:\/\/www.tensorflow.org\/guide\/gpu."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1089\/big.2020.0159"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"e_1_3_2_1_90_1","volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Volos Stavros","year":"2018","unstructured":"Stavros Volos , Kapil Vaswani , and Rodrigo Bruno . 2018 . Graviton: Trusted execution environments on gpus . In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18) . 681--696. Stavros Volos, Kapil Vaswani, and Rodrigo Bruno. 2018. Graviton: Trusted execution environments on gpus. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). 681--696."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833604"},{"key":"e_1_3_2_1_92_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Wang Xiaoguang","year":"2020","unstructured":"Xiaoguang Wang , SengMing Yeoh , Robert Lyerly , Pierre Olivier , Sang-Hoon Kim , and Binoy Ravindran . 2020 . A Framework for Software Diversification with ISA Heterogeneity . In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 427--442. Xiaoguang Wang, SengMing Yeoh, Robert Lyerly, Pierre Olivier, Sang-Hoon Kim, and Binoy Ravindran. 2020. A Framework for Software Diversification with ISA Heterogeneity. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 427--442."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00054"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560627","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:58Z","timestamp":1750182538000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560627"}},"subtitle":["A GPU TEE on Arm Endpoints"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":93,"alternative-id":["10.1145\/3548606.3560627","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560627","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}