J. Alves-foss, P. W. Oman, C. Taylor, and W. S. Harrison, The MILS architecture for high-assurance embedded systems, International Journal of Embedded Systems, vol.2, issue.3/4, pp.239-247, 2006.
DOI : 10.1504/IJES.2006.014859

. Armltd, ARM Security Technology -Building a Secure System using TrustZone Technology, 2009.

A. M. Azab, P. Ning, J. Shah, Q. Chen, R. Bhutkar et al., Hypervision Across Worlds, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.90-102, 2014.
DOI : 10.1145/2660267.2660350

C. Dall and J. Nieh, KVM/ARM, Proceedings of the 19th international conference on Architectural support for programming languages and operating systems, ASPLOS '14, pp.333-348, 2014.
DOI : 10.1145/2541940.2541946

M. El-serngawy and C. Talhi, Securing Business Data on Android Smartphones, Mobile Web Information Systems, pp.218-232, 2014.
DOI : 10.1007/978-3-319-10359-4_18

W. Enck, M. Ongtang, and P. Mcdaniel, Understanding Android Security, IEEE Security & Privacy Magazine, vol.7, issue.1, pp.50-57, 2009.
DOI : 10.1109/MSP.2009.26

T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, Terra, ACM SIGOPS Operating Systems Review, vol.37, issue.5, pp.193-206, 2003.
DOI : 10.1145/1165389.945464

M. Gasser, Building a Secure Computer System, 1988.

D. Grawrock, The Intel Safer Computing Initiative: Building Blocks for Trusted Computing. Books by engineers, for engineers, 2006.

K. Gudeth, M. Pirretti, K. Hoeper, and R. Buskey, Delivering secure applications on commercial mobile devices, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.33-38, 2011.
DOI : 10.1145/2046614.2046622

J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul et al., Lest we remember, Communications of the ACM, vol.52, issue.5, pp.5291-98, 2009.
DOI : 10.1145/1506409.1506429

J. Hwang, S. Suh, S. Heo, C. Park, J. Ryu et al., Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile Phones, 2008 5th IEEE Consumer Communications and Networking Conference, pp.257-261, 2008.
DOI : 10.1109/ccnc08.2007.64

G. Klein, J. Andronick, K. Elphinstone, T. Murray, T. Sewell et al., Comprehensive formal verification of an OS microkernel, ACM Transactions on Computer Systems, vol.32, issue.1, pp.1-270, 2014.
DOI : 10.1145/2560537

K. Kostiainen, J. Ekberg, N. Asokan, and A. Rantala, On-board credentials with open provisioning, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.104-115, 2009.
DOI : 10.1145/1533057.1533074

B. W. Lampson, Protection, ACM SIGOPS Operating Systems Review, vol.8, issue.1, pp.18-24, 1974.
DOI : 10.1145/775265.775268

D. Lie, C. A. Thekkath, and M. Horowitz, Implementing an untrusted operating system on trusted hardware, ACM SIGOPS Operating Systems Review, vol.37, issue.5, pp.178-192, 2003.
DOI : 10.1145/1165389.945463

V. R. Pandya and M. Stamp, iPhone Security Analysis, Journal of Information Security, vol.01, issue.02, pp.74-87, 2010.
DOI : 10.4236/jis.2010.12009

J. M. Rushby, Design and verification of secure systems, ACM SIGOPS Operating Systems Review, vol.15, issue.5, pp.12-21, 1981.
DOI : 10.1145/1067627.806586

N. Santos, H. Raj, S. Saroiu, and A. Wolman, Using ARM trustzone to build a trusted language runtime for mobile applications, Proceedings of the 19th international conference on Architectural support for programming languages and operating systems, ASPLOS '14, pp.67-80, 2014.
DOI : 10.1145/2541940.2541949

A. Seshadri, M. Luk, E. Shi, A. Perrig, L. Van-doorn et al., Pioneer, ACM SIGOPS Operating Systems Review, vol.39, issue.5, pp.1-16, 2005.
DOI : 10.1145/1095809.1095812

G. E. Suh, D. Clarke, B. Gassend, M. Van-dijk, and S. Devadas, AEGIS: Architecture for Tamper-evident and Tamper-resistant Processing, Proceedings of the 17th Annual International Conference on Supercomputing, ICS '03, pp.160-171, 2003.

M. W. Vanfleet, J. A. Luke, W. R. Beckwith, C. Taylor, B. Calloni et al., MILS: Architecture for High-Assurance Embedded Computing, CrossTalk: Journal of Defence Software Engineering, issue.8, pp.1812-1828, 2005.

A. Vasudevan, E. Owusu, Z. Zhou, J. Newsome, and J. M. Mccune, Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?, Proceedings of the 5th International Conference on Trust and Trustworthy Computing, pp.159-178, 2012.
DOI : 10.1007/978-3-642-30921-2_10

P. Wilson, A. Frey, T. Mihm, D. Kershaw, and T. Alves, Implementing Embedded Security on Dual-Virtual-CPU Systems, IEEE Design & Test of Computers, vol.24, issue.6, pp.582-591, 2007.
DOI : 10.1109/MDT.2007.196