Author:
Cheng Dongxu,Liu Jianwei,Guan Zhenyu,Hu Jiale
Publisher
Springer International Publishing
Reference13 articles.
1. Grossschadl, J., Vejda, T., Page, D.: Reassessing the TCG specifications for trusted computing in mobile and embedded systems. In: IEEE International Workshop on Hardware-oriented Security & Trust. IEEE (2008)
2. Alves, T., Felton, D., Alves, T., et al.: Trustzone: integrated hardware and software security. ARM white paper. White Paper (2004)
3. Jiang, H., Chang, R., Ren, L., et al.: Implementing a ARM-based secure boot scheme for the isolated execution environment. In: 2017 13th International Conference on Computational Intelligence and Security (CIS). IEEE (2017)
4. Xiao, J., Yang, Z., Hu, X., Liu, Y., Li, D.: TrustZone-based mobile terminal security system. In: 2018 Chinese Automation Congress (CAC), Xi’an, China, pp. 3981–3985 (2018)
5. Pinto, S., Pereira, J., Gomes, T., et al.: Towards a TrustZone-assisted hypervisor for real-time embedded systems. IEEE Comput. Arch. Lett. PP(99) (2016)