Demystifying arm trustzone: A comprehensive survey

S Pinto, N Santos - ACM computing surveys (CSUR), 2019 - dl.acm.org
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …

Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020 - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

[HTML][HTML] Android data storage security: A review

H Altuwaijri, S Ghouzali - Journal of King Saud University-Computer and …, 2020 - Elsevier
The broad adoption of smartphones has superseded the desktop computers and laptops as
a primary computing platform, due to mobility, constant connectivity and application diversity …

Monet: a user-oriented behavior-based malware variants detection system for android

M Sun, X Li, JCS Lui, RTB Ma… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Android, the most popular mobile OS, has around 78% of the mobile market share. Due to its
popularity, it attracts many malware attacks. In fact, people have discovered around 1 million …

[PDF][PDF] Keystone: A framework for architecting tees

D Lee, D Kohlbrenner, S Shinde, D Song… - arxiv preprint arxiv …, 2019 - academia.edu
Trusted execution environments (TEEs) are becoming a requirement across a wide range of
platforms, from embedded sensors to cloud servers, which encompass a wide range of cost …

Hardware-security technologies for industrial IoT: TrustZone and security controller

C Lesjak, D Hein, J Winter - IECON 2015-41st Annual …, 2015 - ieeexplore.ieee.org
The transition from product-centric to service-centric business models presents a major
challenge to industrial automation and manufacturing systems. This transition increases …

New security threats caused by IMS-based SMS service in 4G LTE networks

GH Tu, CY Li, C Peng, Y Li, S Lu - … of the 2016 ACM SIGSAC conference …, 2016 - dl.acm.org
SMS (Short Messaging Service) is a text messaging service for mobile users to exchange
short text messages. It is also widely used to provide SMS-powered services (eg, mobile …

Secure containers in Android: the Samsung KNOX case study

U Kanonov, A Wool - Proceedings of the 6th Workshop on Security and …, 2016 - dl.acm.org
Bring Your Own Device (BYOD) is a growing trend among enterprises, aiming to improve
workers' mobility and productivity via their smartphones. The threats and dangers posed by …

Truz-droid: Integrating trustzone with mobile operating system

K Ying, A Ahlawat, B Alsharifi, Y Jiang… - Proceedings of the 16th …, 2018 - dl.acm.org
Mobile devices today provide a hardware-protected mode called Trusted Execution
Environment (TEE) to help protect users from a compromised OS and hypervisor. Today TEE …

Horizontal privilege escalation in trusted applications

D Suciu, S McLaughlin, L Simon, R Sion - 29th USENIX Security …, 2020 - usenix.org
Trusted Execution Environments (TEEs) use hardware-based isolation to guard sensitive
data from conventional monolithic OSes. While such isolation strengthens security …