Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Demystifying arm trustzone: A comprehensive survey
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …
state where ubiquitous Internet-enabled “things” will be able to generate and share large …
Systematic literature review on the use of trusted execution environments to protect cloud/fog-based internet of things applications
Trusted Execution Environments have been applied to improve data security in many distinct
application scenarios since they enable data processing in a separate and protected region …
application scenarios since they enable data processing in a separate and protected region …
[PDF][PDF] BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
In the past decade, we have come to rely on computers for various safety and security-
critical tasks, such as securing our homes, operating our vehicles, and controlling our …
critical tasks, such as securing our homes, operating our vehicles, and controlling our …
Sectee: A software-based approach to secure enclave architecture using tee
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …
to secure enclaves are implemented by extending hardware security mechanisms to the …
TrustOTP: Transforming smartphones into secure one-time password tokens
H Sun, K Sun, Y Wang, J **g - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Two-factor authentication has been widely used due to the vulnerabilities associated with
traditional text-based password. One-time password (OTP) plays an indispensable role on …
traditional text-based password. One-time password (OTP) plays an indispensable role on …
Trustice: Hardware-assisted isolated computing environments on mobile devices
H Sun, K Sun, Y Wang, J **g… - 2015 45th Annual IEEE …, 2015 - ieeexplore.ieee.org
Mobile devices have been widely used to process sensitive data and perform important
transactions. It is a challenge to protect secure code from a malicious mobile OS. ARM …
transactions. It is a challenge to protect secure code from a malicious mobile OS. ARM …
[PDF][PDF] MyTEE: Own the Trusted Execution Environment on Embedded Devices.
We propose a solution, MyTEE, that enables a trusted execution environment (TEE) to be
built even in worstcase environments wherein major hardware security primitives (eg, ARM …
built even in worstcase environments wherein major hardware security primitives (eg, ARM …
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps
A new development of smart-home systems is to use mobile apps to control IoT devices
across a Home Area Network (HAN). As verified in our study, those systems tend to rely on …
across a Home Area Network (HAN). As verified in our study, those systems tend to rely on …
Hardware-security technologies for industrial IoT: TrustZone and security controller
C Lesjak, D Hein, J Winter - IECON 2015-41st Annual …, 2015 - ieeexplore.ieee.org
The transition from product-centric to service-centric business models presents a major
challenge to industrial automation and manufacturing systems. This transition increases …
challenge to industrial automation and manufacturing systems. This transition increases …
Privatezone: Providing a private execution environment using arm trustzone
ARM TrustZone is widely used to provide a Trusted Execution Environment (TEE) for mobile
devices. However, the use of TrustZone is limited because TrustZone resources are only …
devices. However, the use of TrustZone is limited because TrustZone resources are only …