{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:59Z","timestamp":1750221119558,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,5]]},"DOI":"10.1145\/3286978.3287015","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T15:45:16Z","timestamp":1544715916000},"page":"302-311","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging ARM TrustZone and Verifiable Computing to Provide Auditable Mobile Functions"],"prefix":"10.1145","author":[{"given":"Nuno O.","family":"Duarte","sequence":"first","affiliation":[{"name":"INESC-ID \/ 1ST, University of Lisbon"}]},{"given":"Sileshi Demesie","family":"Yalew","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology"}]},{"given":"Nuno","family":"Santos","sequence":"additional","affiliation":[{"name":"INESC-ID \/ IST, University of Lisbon"}]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"INESC-ID \/ IST, University of Lisbon"}]}],"member":"320","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"volume-title":"d.}. EU General Data Protection Regulation (GDPR). https:\/\/www.eugdpr.org\/. Accessed","year":"2018","key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. EU General Data Protection Regulation (GDPR). https:\/\/www.eugdpr.org\/. Accessed October 2018 . {n. d.}. EU General Data Protection Regulation (GDPR). https:\/\/www.eugdpr.org\/. Accessed October 2018."},{"volume-title":"d.}. libsnark. https:\/\/github.com\/scipr-lab\/libsnark. Accessed","year":"2018","key":"e_1_3_2_1_2_1","unstructured":"{n. d.}. libsnark. https:\/\/github.com\/scipr-lab\/libsnark. Accessed October 2018 . {n. d.}. libsnark. https:\/\/github.com\/scipr-lab\/libsnark. Accessed October 2018."},{"volume-title":"d.}. Pequin. https:\/\/github.com\/pepper-project\/pequin. Accessed","year":"2018","key":"e_1_3_2_1_3_1","unstructured":"{n. d.}. Pequin. https:\/\/github.com\/pepper-project\/pequin. Accessed October 2018 . {n. d.}. Pequin. https:\/\/github.com\/pepper-project\/pequin. Accessed October 2018."},{"key":"e_1_3_2_1_4_1","unstructured":"{n. d.}. The Genode OS Framework. http:\/\/genode.org. Accessed October 2018.  {n. d.}. The Genode OS Framework. http:\/\/genode.org. Accessed October 2018."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22192"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.24"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of USENIX Security.","author":"Backes Michael","year":"2015","unstructured":"Michael Backes , Sven Bugiel , Christian Hammer , Oliver Schranz , and Philipp von Styp-Rekowsky . 2015 . Boxify: Full-fledged App Sandboxing for Stock Android . In Proc. of USENIX Security. Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, and Philipp von Styp-Rekowsky. 2015. Boxify: Full-fledged App Sandboxing for Stock Android. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Eli Ben-Sasson Alessandro Chiesa Daniel Genkin Eran Tromer and Madars Virza. 2013. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. In Advances in Cryptology--CRYPTO.  Eli Ben-Sasson Alessandro Chiesa Daniel Genkin Eran Tromer and Madars Virza. 2013. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. In Advances in Cryptology--CRYPTO.","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084041.3084066"},{"key":"e_1_3_2_1_11_1","volume-title":"Sheth","author":"Enck William","year":"2010","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N . Sheth . 2010 . TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. of OSDI. William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. of OSDI."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of MoST.","author":"Ge Xinyang","year":"2014","unstructured":"Xinyang Ge , Hayawardh Vijayakumar , and Trent Jaeger . 2014 . SPROBES: Enforcing Kernel Code Integrity on the TrustZone Architecture . In Proc. of MoST. Xinyang Ge, Hayawardh Vijayakumar, and Trent Jaeger. 2014. SPROBES: Enforcing Kernel Code Integrity on the TrustZone Architecture. In Proc. of MoST."},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of USENIX Security.","author":"Heuser Stephan","year":"2014","unstructured":"Stephan Heuser , Adwait Nadkarni , William Enck , and Ahmad-Reza Sadeghi . 2014 . ASM: A Programmable Interface for Extending Android Security . In Proc. of USENIX Security. Stephan Heuser, Adwait Nadkarni, William Enck, and Ahmad-Reza Sadeghi. 2014. ASM: A Programmable Interface for Extending Android Security. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210334"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2014.13"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2565585.2565591"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307670"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23227"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541949"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of NDSS.","author":"Setty Srinath TV","year":"2012","unstructured":"Srinath TV Setty , Richard McPherson , Andrew J Blumberg , and Michael Walfish . 2012 . Making Argument Systems for Outsourced Computation Practical (Sometimes) . In Proc. of NDSS. Srinath TV Setty, Richard McPherson, Andrew J Blumberg, and Michael Walfish. 2012. Making Argument Systems for Outsourced Computation Practical (Sometimes). In Proc. of NDSS."},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of USENIX Security.","author":"Setty Srinath TV","year":"2012","unstructured":"Srinath TV Setty , Victor Vu , Nikhil Panpalia , Benjamin Braun , Andrew J Blumberg , and Michael Walfish . 2012 . Taking Proof-Based Verified Computation a Few Steps Closer to Practicality . In Proc. of USENIX Security. Srinath TV Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J Blumberg, and Michael Walfish. 2012. Taking Proof-Based Verified Computation a Few Steps Closer to Practicality. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Justin Thaler. 2013. Time-Optimal Interactive Proofs for Circuit Evaluation. In Advances in Cryptology--CRYPTO. 71--89.  Justin Thaler. 2013. Time-Optimal Interactive Proofs for Circuit Evaluation. In Advances in Cryptology--CRYPTO. 71--89.","DOI":"10.1007\/978-3-642-40084-1_5"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133984"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2641562"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557560"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.243"}],"event":{"name":"MobiQuitous '18: Computing, Networking and Services","sponsor":["EAI The European Alliance for Innovation"],"location":"New York NY USA","acronym":"MobiQuitous '18"},"container-title":["Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286978.3287015","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3286978.3287015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:08Z","timestamp":1750208528000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286978.3287015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":27,"alternative-id":["10.1145\/3286978.3287015","10.1145\/3286978"],"URL":"https:\/\/doi.org\/10.1145\/3286978.3287015","relation":{},"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"2018-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}