1. Design and verification of the arm confidential compute architecture;li;16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22),2022
2. Secure computer systems: Mathematical foundations;bell;in Technical rept MITRE CORP BEDFORD MASS,1973
3. A very powerful clipboard: Analysis of a samsung in-the-wild exploit chain;stone;Project zero,2022
4. Lark artifact;zeng,2023
5. FLEXDROID: Enforcing In-App Privilege Separation in Android