{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:03:57Z","timestamp":1772042637679,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science Foundation","award":["CNS-2313139, CNS-1928331, CNS-1928349, CNS-2225424"],"award-info":[{"award-number":["CNS-2313139, CNS-1928331, CNS-1928349, CNS-2225424"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,19]]},"DOI":"10.1145\/3626232.3653262","type":"proceedings-article","created":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T18:20:25Z","timestamp":1718043625000},"page":"265-276","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7177-325X","authenticated-orcid":false,"given":"Jinghui","family":"Liao","sequence":"first","affiliation":[{"name":"Wayne State University, Detroit, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9173-156X","authenticated-orcid":false,"given":"Niusen","family":"Chen","sequence":"additional","affiliation":[{"name":"Michigan Technological University, Houghton, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6513-5447","authenticated-orcid":false,"given":"Lichen","family":"Xia","sequence":"additional","affiliation":[{"name":"University of Delaware, Newark, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9372-9607","authenticated-orcid":false,"given":"Bo","family":"Chen","sequence":"additional","affiliation":[{"name":"Michigan Technological University, Houghton, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5864-4675","authenticated-orcid":false,"given":"Weisong","family":"Shi","sequence":"additional","affiliation":[{"name":"University of Delaware, Newark, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,6,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. https:\/\/www.arm.com\/products\/silicon-ip-security."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Bare Metal Programming on Raspberry Pi 3. https:\/\/github.com\/bztsrc\/ raspi3-tutorial."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. Firefly AIO-3399J. https:\/\/en.t-firefly.com\/product\/industry\/aio_3399."},{"key":"e_1_3_2_1_4_1","unstructured":"2004. TrueCrypt: Free open-source disk encryption software. https:\/\/ www.truecrypt.org"},{"key":"e_1_3_2_1_5_1","unstructured":"2023. OP-TEE Trusted Applications. https:\/\/optee.readthedocs.io\/en\/latest\/ architecture\/trusted_applications.html. Accessed: 2023--12--28."},{"key":"e_1_3_2_1_6_1","volume-title":"DAIS","author":"Amacher Julien","year":"2019","unstructured":"Julien Amacher and Valerio Schiavoni. 2019. On the Performance of ARM Trust- Zone: (Practical Experience Report). In Distributed Applications and Interoperable Systems: 19th IFIP WG 6.1 International Conference, DAIS 2019. Springer, 133--151."},{"key":"e_1_3_2_1_7_1","unstructured":"ARM. 2021. Arm Confidential Compute Architecture. https:\/\/developer.arm.com\/ architectures\/architecture-security-features. accessed: 2021-03--31."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 375--388","author":"Ning Peng","year":"2016","unstructured":"AmrMAzab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Ganesh Ganesh, Jia Ma, and Wenbo Shen. 2016. SICE: A hardware-level strongly isolated computing environment for x86 multi-core platforms. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 375--388."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660313"},{"key":"e_1_3_2_1_10_1","volume-title":"WISTP","author":"Bukasa Sebanjila Kevin","year":"2018","unstructured":"Sebanjila Kevin Bukasa, Ronan Lashermes, H\u00e9l\u00e8ne Le Bouder, Jean-Louis Lanet, and Axel Legay. 2018. How TrustZone could be bypassed: Side-channel attacks on a modern system-on-chip. In Information Security Theory and Practice: 11th IFIP WG 11.2 International Conference, WISTP 2017. Springer, 93--109."},{"key":"e_1_3_2_1_11_1","volume-title":"User-friendly deniable storage for mobile devices. computers & security 72","author":"Chang Bing","year":"2018","unstructured":"Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yingjiu Li, and Zhan Wang. 2018. User-friendly deniable storage for mobile devices. computers & security 72 (2018), 163--174."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818046"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00054"},{"key":"e_1_3_2_1_14_1","volume-title":"2020 IEEE Symposium on Security and Privacy Poster Session.","author":"Chen Bo","year":"2020","unstructured":"Bo Chen and Niusen Chen. 2020. Poster: a secure plausibly deniable system for mobile devices against multi-snapshot adversaries. In 2020 IEEE Symposium on Security and Privacy Poster Session."},{"key":"e_1_3_2_1_15_1","first-page":"239","article-title":"INFUSE: Invisible plausiblydeniable file system for NAND flash","volume":"2020","author":"Chen Chen","year":"2020","unstructured":"Chen Chen, Anrin Chakraborti, and Radu Sion. 2020. INFUSE: Invisible plausiblydeniable file system for NAND flash. Proc. of PET 2020, 4 (2020), 239--254.","journal-title":"Proc. of PET"},{"key":"e_1_3_2_1_16_1","volume-title":"The 30th Usenix Security Symposium.","author":"Chen Chen","year":"2021","unstructured":"Chen Chen, Anrin Chakraborti, and Radu Sion. 2021. PEARL: Plausibly Deniable Flash Translation Layer using WOM coding. In The 30th Usenix Security Symposium."},{"key":"e_1_3_2_1_17_1","volume-title":"HiPDS: A Storage Hardware-independent Plausibly Deniable Storage System","author":"Chen Niusen","year":"2023","unstructured":"Niusen Chen and Bo Chen. 2023. HiPDS: A Storage Hardware-independent Plausibly Deniable Storage System. IEEE Transactions on Information Forensics and Security (2023)."},{"key":"e_1_3_2_1_18_1","volume-title":"MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices. In EAI International Conference on Applied Cryptography in Computer and Communications. Springer, 138--154","author":"Chen Niusen","year":"2021","unstructured":"Niusen Chen, Bo Chen, and Weisong Shi. 2021. MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices. In EAI International Conference on Applied Cryptography in Computer and Communications. Springer, 138--154."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17081-2_9"},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Security and Privacy in Communication Systems. Springer, 150--169","author":"Chen Niusen","year":"2022","unstructured":"Niusen Chen, Bo Chen, and Weisong Shi. 2022. A Cross-layer Plausibly Deniable Encryption System for Mobile Devices. In International Conference on Security and Privacy in Communication Systems. Springer, 150--169."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81645-2_23"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00023"},{"key":"e_1_3_2_1_23_1","unstructured":"Google Code. 2011. OpenNFM. https:\/\/code.google.com\/p\/opennfm\/."},{"key":"e_1_3_2_1_24_1","unstructured":"OP-TEE Contributors. 2021. OP-TEE\/manifest. https:\/\/github.com\/OP-TEE\/ manifest GitHub repository."},{"key":"e_1_3_2_1_25_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Das Poulami","year":"2019","unstructured":"Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Host\u00e1kov\u00e1, Patrick Jauernig, Sebastian Faust, and Ahmad-Reza Sadeghi. 2019. FastKitten: practical smart contracts on bitcoin. In 28th USENIX Security Symposium (USENIX Security 19). 801--818."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Wendi Feng Chuanchang Liu Zehua Guo Thar Baker Gang Wang Meng Wang Bo Cheng and Junliang Chen. 2020. MobiGyges: A mobile hidden volume for preventing data loss improving storage utilization and avoiding device reboot. Future Generation Computer Systems (2020).","DOI":"10.1016\/j.future.2020.03.048"},{"key":"e_1_3_2_1_27_1","unstructured":"Freecode. 2014. fio. http:\/\/freecode.com\/projects\/fio."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the ACSAC. 339--349","author":"Guan Le","year":"2017","unstructured":"Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, and Luning Xia. 2017. Supporting transparent snapshot for baremetal malware analysis on mobile devices. In Proceedings of the ACSAC. 339--349."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134011"},{"key":"e_1_3_2_1_30_1","volume-title":"2021 IEEE\/ACM Symposium on Edge Computing (SEC). IEEE, 441--447","author":"Liao Jinghui","year":"2021","unstructured":"Jinghui Liao, Bo Chen, and Weisong Shi. 2021. TrustZone enhanced plausibly deniable encryption system for mobile devices. In 2021 IEEE\/ACM Symposium on Edge Computing (SEC). IEEE, 441--447."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3523259"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 30th Annual Computer Security Applications Conference. 346--355","author":"Lind Johannes","year":"2014","unstructured":"Johannes Lind, Henry Grahn, Thomas Johansson, and Markus Karlsson. 2014. Tee based mobile plausible deniability. In Proceedings of the 30th Annual Computer Security Applications Conference. 346--355."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359627"},{"key":"e_1_3_2_1_34_1","first-page":"3","article-title":"Know your enemy: Leveraging data analysis to expose potential attackers in mobile encrypted communication","volume":"22","author":"Muslukhov Ildar","year":"2019","unstructured":"Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, and Konstantin Beznosov. 2019. Know your enemy: Leveraging data analysis to expose potential attackers in mobile encrypted communication. ACM Transactions on Privacy and Security (TOPS) 22, 1 (2019), 3.","journal-title":"ACM Transactions on Privacy and Security (TOPS)"},{"key":"e_1_3_2_1_35_1","volume-title":"Open Portable Trusted Execution Environment. https:\/\/www.optee. org\/","author":"OP-TEE.","year":"2019","unstructured":"OP-TEE. 2019. Open Portable Trusted Execution Environment. https:\/\/www.optee. org\/ (2019)."},{"key":"e_1_3_2_1_36_1","volume-title":"DEFY: A deniable, encrypted file system for log-structured storage.","author":"Peters Timothy M","year":"2015","unstructured":"Timothy M Peters, Mark A Gondree, and Zachary NJ Peterson. 2015. DEFY: A deniable, encrypted file system for log-structured storage. (2015)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/121132.121137"},{"key":"e_1_3_2_1_38_1","volume-title":"On Implementing Deniable Storage Encryption for Mobile Devices. In 20th Annual Network and Distributed System Security Symposium, NDSS","author":"Skillen Adam","year":"2013","unstructured":"Adam Skillen and MohammadMannan. 2013. On Implementing Deniable Storage Encryption for Mobile Devices. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24--27."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.56"},{"key":"e_1_3_2_1_40_1","unstructured":"Synopsys. 2023. DesignWare USB 2.0 Digital Controllers. Available at: https: \/\/www.synopsys.com\/dw\/ipdir.php?ds=dwc_usb_2_0_digital_controllers."},{"key":"e_1_3_2_1_41_1","unstructured":"Deepthi Tankasala Niusen Chen and Bo Chen. 2022. Creating a testbed for flash memory research via lpc-h3131 and opennfm-linux version. Technical Report. Technical report Department of Computer Science Michigan Tech."},{"key":"e_1_3_2_1_42_1","unstructured":"TrueCrypt. [n. d.]. Free open source on-the-fly disk encryption software.version 7.1a. http:\/\/www.truecrypt.org\/. Accessed: 2021-08--23."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13257-0_36"}],"event":{"name":"CODASPY '24: Fourteenth ACM Conference on Data and Application Security and Privacy","location":"Porto Portugal","acronym":"CODASPY '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3626232.3653262","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3626232.3653262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:48:38Z","timestamp":1755892118000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3626232.3653262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,19]]},"references-count":43,"alternative-id":["10.1145\/3626232.3653262","10.1145\/3626232"],"URL":"https:\/\/doi.org\/10.1145\/3626232.3653262","relation":{},"subject":[],"published":{"date-parts":[[2024,6,19]]},"assertion":[{"value":"2024-06-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}