The MILS architecture for high-assurance embedded systems, International Journal of Embedded Systems, vol.2, issue.3/4, pp.239-247, 2006. ,
DOI : 10.1504/IJES.2006.014859
ARM Security Technology -Building a Secure System using TrustZone Technology, 2009. ,
Hypervision Across Worlds, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.90-102, 2014. ,
DOI : 10.1145/2660267.2660350
KVM/ARM, Proceedings of the 19th international conference on Architectural support for programming languages and operating systems, ASPLOS '14, pp.333-348, 2014. ,
DOI : 10.1145/2541940.2541946
Securing Business Data on Android Smartphones, Mobile Web Information Systems, pp.218-232, 2014. ,
DOI : 10.1007/978-3-319-10359-4_18
Understanding Android Security, IEEE Security & Privacy Magazine, vol.7, issue.1, pp.50-57, 2009. ,
DOI : 10.1109/MSP.2009.26
Terra, ACM SIGOPS Operating Systems Review, vol.37, issue.5, pp.193-206, 2003. ,
DOI : 10.1145/1165389.945464
Building a Secure Computer System, 1988. ,
The Intel Safer Computing Initiative: Building Blocks for Trusted Computing. Books by engineers, for engineers, 2006. ,
Delivering secure applications on commercial mobile devices, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.33-38, 2011. ,
DOI : 10.1145/2046614.2046622
Lest we remember, Communications of the ACM, vol.52, issue.5, pp.5291-98, 2009. ,
DOI : 10.1145/1506409.1506429
Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile Phones, 2008 5th IEEE Consumer Communications and Networking Conference, pp.257-261, 2008. ,
DOI : 10.1109/ccnc08.2007.64
Comprehensive formal verification of an OS microkernel, ACM Transactions on Computer Systems, vol.32, issue.1, pp.1-270, 2014. ,
DOI : 10.1145/2560537
On-board credentials with open provisioning, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.104-115, 2009. ,
DOI : 10.1145/1533057.1533074
Protection, ACM SIGOPS Operating Systems Review, vol.8, issue.1, pp.18-24, 1974. ,
DOI : 10.1145/775265.775268
Implementing an untrusted operating system on trusted hardware, ACM SIGOPS Operating Systems Review, vol.37, issue.5, pp.178-192, 2003. ,
DOI : 10.1145/1165389.945463
iPhone Security Analysis, Journal of Information Security, vol.01, issue.02, pp.74-87, 2010. ,
DOI : 10.4236/jis.2010.12009
Design and verification of secure systems, ACM SIGOPS Operating Systems Review, vol.15, issue.5, pp.12-21, 1981. ,
DOI : 10.1145/1067627.806586
Using ARM trustzone to build a trusted language runtime for mobile applications, Proceedings of the 19th international conference on Architectural support for programming languages and operating systems, ASPLOS '14, pp.67-80, 2014. ,
DOI : 10.1145/2541940.2541949
Pioneer, ACM SIGOPS Operating Systems Review, vol.39, issue.5, pp.1-16, 2005. ,
DOI : 10.1145/1095809.1095812
AEGIS: Architecture for Tamper-evident and Tamper-resistant Processing, Proceedings of the 17th Annual International Conference on Supercomputing, ICS '03, pp.160-171, 2003. ,
MILS: Architecture for High-Assurance Embedded Computing, CrossTalk: Journal of Defence Software Engineering, issue.8, pp.1812-1828, 2005. ,
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?, Proceedings of the 5th International Conference on Trust and Trustworthy Computing, pp.159-178, 2012. ,
DOI : 10.1007/978-3-642-30921-2_10
Implementing Embedded Security on Dual-Virtual-CPU Systems, IEEE Design & Test of Computers, vol.24, issue.6, pp.582-591, 2007. ,
DOI : 10.1109/MDT.2007.196