-
1
-
-
0012112708
-
Architecture Reference Manual (ARMv7-A and ARMv7-R edition)
-
ARM DDI C
-
Architecture Reference Manual (ARMv7-A and ARMv7-R edition). ARM DDI C, 2008.
-
(2008)
-
-
-
2
-
-
84867882102
-
Towards green data centers: a comparison of x86 and ARM architectures power efficiency
-
Aroca, R.V., Gonçalves, L.M.G., Towards green data centers: a comparison of x86 and ARM architectures power efficiency. J Parall Distrib Comput 72:12 (2012), 1770–1780.
-
(2012)
J Parall Distrib Comput
, vol.72
, Issue.12
, pp. 1770-1780
-
-
Aroca, R.V.1
Gonçalves, L.M.G.2
-
3
-
-
84985029117
-
Man in the binder: He who controls IPC, controls the droid, Black Hat
-
Artenstein, N., Revivo, I., Man in the binder: He who controls IPC, controls the droid, Black Hat. 2014.
-
(2014)
-
-
Artenstein, N.1
Revivo, I.2
-
4
-
-
84937551783
-
Denial-of-app attack: Inhibiting the installation of android apps on stock phones
-
in: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices
-
Arzt, S., Huber, S., Rasthofer, S., Bodden, E., Denial-of-app attack: Inhibiting the installation of android apps on stock phones. in: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, pp. 21–26, 2014.
-
(2014)
, pp. 21-26
-
-
Arzt, S.1
Huber, S.2
Rasthofer, S.3
Bodden, E.4
-
5
-
-
85030764640
-
Fast Models – ARM
-
Available from Accessed 30 August 2015
-
ARM, Fast Models – ARM. Available from http://www.arm.com/products/tools/models/fast-models/, 2011 Accessed 30 August 2015.
-
(2011)
-
-
ARM1
-
6
-
-
84910673981
-
Hypervision across worlds: Real-time kernel protection from the ARM TrustZone secure world
-
in: Proceedings of the 21st ACM Conference on Computer and Communications Security
-
Azab, A.M., Ning, P., Shah, J., Chen, Q., Bhutkar, R., Ganesh, G., et al. Hypervision across worlds: Real-time kernel protection from the ARM TrustZone secure world. in: Proceedings of the 21st ACM Conference on Computer and Communications Security, pp. 1028–1031, 2014.
-
(2014)
, pp. 1028-1031
-
-
Azab, A.M.1
Ning, P.2
Shah, J.3
Chen, Q.4
Bhutkar, R.5
Ganesh, G.6
-
7
-
-
47749115939
-
QEMU: a multihost multitarget emulator
-
Bartholomew, D., QEMU: a multihost multitarget emulator. Linux J 2006:145 (2006), 68–71.
-
(2006)
Linux J
, vol.2006
, Issue.145
, pp. 68-71
-
-
Bartholomew, D.1
-
8
-
-
85063636742
-
QEMU, a fast and portable dynamic translator
-
in: Conference on Usenix Technical Conference
-
Bellard, F., QEMU, a fast and portable dynamic translator. in: Conference on Usenix Technical Conference, pp. 41–46, 2005.
-
(2005)
, pp. 41-46
-
-
Bellard, F.1
-
9
-
-
67650067345
-
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
-
Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. ACM SIGOPS Operat Syst Rev 42:2 (2010), 2–13.
-
(2010)
ACM SIGOPS Operat Syst Rev
, vol.42
, Issue.2
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
-
10
-
-
84942511833
-
Efficient virtualization-based application protection against untrusted operating system
-
in: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
-
Cheng, Y., Ding, X., Deng, R.H., Efficient virtualization-based application protection against untrusted operating system. in: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 345–356, 2015.
-
(2015)
, pp. 345-356
-
-
Cheng, Y.1
Ding, X.2
Deng, R.H.3
-
11
-
-
79961035117
-
Analyzing inter-application communication in android
-
in: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
-
Chin, E., Felt, A.P., Greenwood, K., Wagner, D., Analyzing inter-application communication in android. in: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 239–252, 2011.
-
(2011)
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
12
-
-
85030750295
-
Kvm for arm
-
Proceedings of the Ottawa Linux Symposium
-
Dall, C., Nieh, J., Kvm for arm. Proceedings of the Ottawa Linux Symposium, 2010.
-
(2010)
-
-
Dall, C.1
Nieh, J.2
-
13
-
-
84897759668
-
KVM/ARM: the design and implementation of the linux ARM hypervisor
-
Available from
-
Dall, C., Nieh, J., KVM/ARM: the design and implementation of the linux ARM hypervisor. ACM SIGARCH Comput Architect News 42:1 (2014), 333–348, 10.1145/2541940.2541946 Available from http://doi.acm.org/10.1145/2541940.2541946.
-
(2014)
ACM SIGARCH Comput Architect News
, vol.42
, Issue.1
, pp. 333-348
-
-
Dall, C.1
Nieh, J.2
-
14
-
-
84897815337
-
ARMvisor: System virtualization for ARM
-
in: Proceedings of the Ottawa Linux Symposium
-
Ding, J.-H., Lin, C.-J., Chang, P.-H., Tsang, C.-H., Hsu, W.-C., Chung, Y.-C., ARMvisor: System virtualization for ARM. in: Proceedings of the Ottawa Linux Symposium, pp. 93–107, 2012.
-
(2012)
, pp. 93-107
-
-
Ding, J.-H.1
Lin, C.-J.2
Chang, P.-H.3
Tsang, C.-H.4
Hsu, W.-C.5
Chung, Y.-C.6
-
15
-
-
84897681073
-
Taintdroid: an information flow tracking system for real-time privacy monitoring on smartphones
-
Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., et al. Taintdroid: an information flow tracking system for real-time privacy monitoring on smartphones. Commun ACM 57:3 (2010), 99–106.
-
(2010)
Commun ACM
, vol.57
, Issue.3
, pp. 99-106
-
-
Enck, W.1
Gilbert, P.2
Chun, B.G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
-
16
-
-
78149343900
-
The okl4 microvisor: convergence point of microkernels and hypervisors
-
in: ACM SIGCOMM Asia-Pacific Workshop on Systems, Apsys 2010, New Delhi, India, pp. 19–24, August
-
Heiser, G., Leslie, B., The okl4 microvisor: convergence point of microkernels and hypervisors. in: ACM SIGCOMM Asia-Pacific Workshop on Systems, Apsys 2010, New Delhi, India, pp. 19–24, August, 2010.
-
(2010)
-
-
Heiser, G.1
Leslie, B.2
-
17
-
-
84875683130
-
Inktag: Secure applications on an untrusted operating system
-
in: Proceedings of the 18th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 253–264. doi:10.1145/2451116.2451146; Available from
-
Hofmann, O.S., Kim, S., Dunn, A.M., Lee, M.Z., Witchel, E., Inktag: Secure applications on an untrusted operating system. in: Proceedings of the 18th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 253–264. doi:10.1145/2451116.2451146; Available from http://doi.acm.org/10.1145/2451116.2451146, 2013.
-
(2013)
-
-
Hofmann, O.S.1
Kim, S.2
Dunn, A.M.3
Lee, M.Z.4
Witchel, E.5
-
18
-
-
80755187778
-
“These aren't the droids you're looking for”: Retrofitting android to protect data from imperious applications
-
in: ACM Conference on Computer and Communications Security
-
Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D., “These aren't the droids you're looking for”: Retrofitting android to protect data from imperious applications. in: ACM Conference on Computer and Communications Security, pp. 639–652, 2011.
-
(2011)
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
19
-
-
84967057581
-
Transparent page-based kernel and user space execution tracing from a custom minimal arm hypervsior
-
in: The IEEE International Conference on Trust, Security and Privacy in Computing and Communications
-
Horsch, J., Wessel, S., Transparent page-based kernel and user space execution tracing from a custom minimal arm hypervsior. in: The IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 408–417, 2015.
-
(2015)
, pp. 408-417
-
-
Horsch, J.1
Wessel, S.2
-
20
-
-
51949098506
-
Xen on ARM: System virtualization using xen hypervisor for ARM-Based secure mobile phones
-
in: Proceedings of the 5th IEEE Consumer Communications and Networking Conference, pp. 257–261. doi:10.1109/ccnc08.2007.64
-
Hwang, J.-Y., bum Suh, S., Heo, S.-K., Park, C.-J., Ryu, J.-M., Park, S.-Y., et al. Xen on ARM: System virtualization using xen hypervisor for ARM-Based secure mobile phones. in: Proceedings of the 5th IEEE Consumer Communications and Networking Conference, pp. 257–261. doi:10.1109/ccnc08.2007.64, 2008.
-
(2008)
-
-
Hwang, J.-Y.1
bum Suh, S.2
Heo, S.-K.3
Park, C.-J.4
Ryu, J.-M.5
Park, S.-Y.6
-
21
-
-
51949117926
-
A multi-layer mandatory access control mechanism for mobile devices based on virtualization
-
in: Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE
-
Lee, S.M., Suh, S.B., Jeong, B., Mo, S., A multi-layer mandatory access control mechanism for mobile devices based on virtualization. in: Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE, pp. 251–256, 2008.
-
(2008)
, pp. 251-256
-
-
Lee, S.M.1
Suh, S.B.2
Jeong, B.3
Mo, S.4
-
22
-
-
84919340836
-
Multi-tiered security architecture for arm via the virtualization and security extensions
-
in: International Workshop on Database and Expert Systems Applications
-
Lengyel, T.K., Kittel, T., Pfoh, J., Eckert, C., Multi-tiered security architecture for arm via the virtualization and security extensions. in: International Workshop on Database and Expert Systems Applications, pp. 308–312, 2014.
-
(2014)
, pp. 308-312
-
-
Lengyel, T.K.1
Kittel, T.2
Pfoh, J.3
Eckert, C.4
-
23
-
-
85030774887
-
Multi-platform extension of lightweight virtual machines
-
[Master's thesis]; Huazhong University of Science and Technology
-
Li, D., Multi-platform extension of lightweight virtual machines. [Master's thesis]; Huazhong University of Science and Technology, 2011.
-
(2011)
-
-
Li, D.1
-
24
-
-
84984907980
-
Virtualswindle: an automated attack against in-app billing on android
-
pp. 459–470
-
Mulliner, C., Robertson, W., Kirda, E., Virtualswindle: an automated attack against in-app billing on android. pp. 459–470, 2014.
-
(2014)
-
-
Mulliner, C.1
Robertson, W.2
Kirda, E.3
-
25
-
-
84958594618
-
XNPro: low-impact hypervisor-based execution prevention on ARM
-
in: International Workshop on Trustworthy Embedded Devices
-
Nordholz, J., Vetter, J., Peter, M., Junkerpetschick, M., Danisevskis, J., XNPro: low-impact hypervisor-based execution prevention on ARM. in: International Workshop on Trustworthy Embedded Devices, pp. 55–64, 2015.
-
(2015)
, pp. 55-64
-
-
Nordholz, J.1
Vetter, J.2
Peter, M.3
Junkerpetschick, M.4
Danisevskis, J.5
-
26
-
-
84903960663
-
Vimo (virtualization for mobile): A virtual machine monitor supporting full virtualization for arm mobile systems
-
48–53
-
Oh, S.C., Vimo (virtualization for mobile): A virtual machine monitor supporting full virtualization for arm mobile systems. 48–53, 2010.
-
(2010)
-
-
Oh, S.C.1
-
27
-
-
84863667079
-
Energy- and cost-efficiency analysis of ARM-based clusters
-
in: The IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
-
Ou, Z., Pang, B., Deng, Y., Nurminen, J.K., Hui, P., Energy- and cost-efficiency analysis of ARM-based clusters. in: The IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 115–123, 2012.
-
(2012)
, pp. 115-123
-
-
Ou, Z.1
Pang, B.2
Deng, Y.3
Nurminen, J.K.4
Hui, P.5
-
28
-
-
85030780344
-
T-KVM: A Trusted architecture for KVM ARM v7 and v8 Virtual Machines Securing Virtual Machines by means of KVM, TrustZone, TEE and SELinux
-
in: CLOUD COMPUTING 2015: The Sixth International Conference on Cloud Computing, GRIDs and Virtualization
-
Paolino, M., Rigo, A., Spyridakis, A., Fanguède, J., Lalov, P., Raho, D., T-KVM: A Trusted architecture for KVM ARM v7 and v8 Virtual Machines Securing Virtual Machines by means of KVM, TrustZone, TEE and SELinux. in: CLOUD COMPUTING 2015: The Sixth International Conference on Cloud Computing, GRIDs and Virtualization, 2015.
-
(2015)
-
-
Paolino, M.1
Rigo, A.2
Spyridakis, A.3
Fanguède, J.4
Lalov, P.5
Raho, D.6
-
29
-
-
85030785439
-
Real-time operating system virtualization for xen-arm
-
Park, M., Yoo, S.H., Yoo, C., Real-time operating system virtualization for xen-arm. 2008.
-
(2008)
-
-
Park, M.1
Yoo, S.H.2
Yoo, C.3
-
30
-
-
84875983680
-
CaffeineMark 3.0
-
Available from Accessed 20 October 2015
-
Pendragon Software Corporation, CaffeineMark 3.0. Available from http://www.benchmarkhq.ru/cm30/, 1997 Accessed 20 October 2015.
-
(1997)
-
-
Pendragon Software Corporation1
-
31
-
-
81455138600
-
Java SciMark 2.0
-
Available from Accessed 18 March 2017
-
Pozo, R., Miller, B., Java SciMark 2.0. Available from http://math.nist.gov/scimark2, 2004 Accessed 18 March 2017.
-
(2004)
-
-
Pozo, R.1
Miller, B.2
-
32
-
-
85021711566
-
Android binder security note: On passing binder through another binder
-
Rosa, T., Android binder security note: On passing binder through another binder. 2011.
-
(2011)
-
-
Rosa, T.1
-
33
-
-
84916598375
-
EmbeddedXEN: A revisited architecture of the xen hypervisor to support ARM-based embedded virtualization
-
White paper, Switzerland
-
Rossier, D., EmbeddedXEN: A revisited architecture of the xen hypervisor to support ARM-based embedded virtualization. White paper, Switzerland, 2012.
-
(2012)
-
-
Rossier, D.1
-
34
-
-
85021750303
-
H-Binder: a hardened binder framework on android systems
-
in: 12th EAI International Conference on Security and Privacy in Communication Networks
-
Shen, D., Zhang, Z., Li, Z., Ding, X., Deng, R., H-Binder: a hardened binder framework on android systems. in: 12th EAI International Conference on Security and Privacy in Communication Networks, pp. 24–43, 2016.
-
(2016)
, pp. 24-43
-
-
Shen, D.1
Zhang, Z.2
Li, Z.3
Ding, X.4
Deng, R.5
-
35
-
-
0003486463
-
Designing the user interface: strategies for effective human-computer interaction
-
3rd ed Addison-Wesley
-
Shneiderman, B., Designing the user interface: strategies for effective human-computer interaction. 3rd ed, 1998, Addison-Wesley.
-
(1998)
-
-
Shneiderman, B.1
-
36
-
-
0002254859
-
Binary translation
-
Sites, R.L., Binary translation. Commun ACM 36:2 (1993), 69–81.
-
(1993)
Commun ACM
, vol.36
, Issue.2
, pp. 69-81
-
-
Sites, R.L.1
-
37
-
-
44649165755
-
ARM and Intel battle over the mobile chip's future
-
Smith, B., ARM and Intel battle over the mobile chip's future. Computer 41:5 (2008), 15–18.
-
(2008)
Computer
, vol.41
, Issue.5
, pp. 15-18
-
-
Smith, B.1
-
38
-
-
84874562066
-
Exploring an open wifi detection vulnerability as a malware attack vector on ios devices
-
in: International Conference on Malicious and Unwanted Software
-
Spaulding, J., Krauss, A., Srinivasan, A., Exploring an open wifi detection vulnerability as a malware attack vector on ios devices. in: International Conference on Malicious and Unwanted Software, pp. 87–93, 2012.
-
(2012)
, pp. 87-93
-
-
Spaulding, J.1
Krauss, A.2
Srinivasan, A.3
-
39
-
-
84855558771
-
Implementing a simple trap and emulate vmm for the arm architecture
-
in: IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
-
Suzuki, A., Oikawa, S., Implementing a simple trap and emulate vmm for the arm architecture. in: IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, pp. 371–379, 2011.
-
(2011)
, pp. 371-379
-
-
Suzuki, A.1
Oikawa, S.2
-
40
-
-
20344391930
-
Intel virtualization technology
-
Uhlig, R., Neiger, G., Rodgers, D., Santoni, A.L., Martins, F.C.M., Anderson, A.V., et al. Intel virtualization technology. Computer 38:5 (2005), 48–56.
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.L.4
Martins, F.C.M.5
Anderson, A.V.6
-
41
-
-
80051566140
-
Implementing hardware-supported virtualization in okl4 on arm
-
[Ph.D. thesis]; The University of New South Wales
-
Varanasi, P., Implementing hardware-supported virtualization in okl4 on arm. [Ph.D. thesis]; The University of New South Wales, 2010.
-
(2010)
-
-
Varanasi, P.1
-
42
-
-
85030785206
-
Survey on android rootkit, Microprocessors
-
Wen-Xin, L.I., Wang, J.B., De-Jun, M.U., Yuan, Y., Survey on android rootkit, Microprocessors. 2011.
-
(2011)
-
-
Wen-Xin, L.I.1
Wang, J.B.2
De-Jun, M.U.3
Yuan, Y.4
-
43
-
-
85030757373
-
Supported Xen Project 4.4 series
-
Available from Accessed 7 May 2014
-
XenProject, Supported Xen Project 4.4 series. Available from http://www.xenproject.org/downloads/xen-archives/xen-44-series.html, 2013 Accessed 7 May 2014.
-
(2013)
-
-
XenProject1
-
44
-
-
85030767939
-
A lightweight monitor for android kernel protection
-
Computer Engineering
-
Yang, Y., Qian, Z., Huang, H., A lightweight monitor for android kernel protection. Computer Engineering, 2014.
-
(2014)
-
-
Yang, Y.1
Qian, Z.2
Huang, H.3
-
45
-
-
84855824009
-
Android platform based linux kernel rootkit
-
in: International Conference on Malicious & Unwanted Software
-
You, D.H., Noh, B.N., Android platform based linux kernel rootkit. in: International Conference on Malicious & Unwanted Software, 2011, 79–87.
-
(2011)
, pp. 79-87
-
-
You, D.H.1
Noh, B.N.2
-
46
-
-
85030790981
-
Study of linux kernel virtual machine technology implemented on arm platform
-
[Master's thesis]; Huazhong University of Science and Technology
-
Zhao, Y., Study of linux kernel virtual machine technology implemented on arm platform. [Master's thesis]; Huazhong University of Science and Technology, 2011.
-
(2011)
-
-
Zhao, Y.1
-
47
-
-
85030785686
-
Study of embedded system security assurance based on virtualization technology
-
[Master's thesis]; Nankai University
-
Zhong, M., Study of embedded system security assurance based on virtualization technology. [Master's thesis]; Nankai University, 2013.
-
(2013)
-
-
Zhong, M.1
-
48
-
-
84878350874
-
Building verifiable trusted path on commodity x86 computers
-
in: Proceedings of the 33rd IEEE Symposium on Security and Privacy
-
Zhou, Z., Gligor, V.D., Newsome, J., McCune, J.M., Building verifiable trusted path on commodity x86 computers. in: Proceedings of the 33rd IEEE Symposium on Security and Privacy, pp. 616–630, 2012.
-
(2012)
, pp. 616-630
-
-
Zhou, Z.1
Gligor, V.D.2
Newsome, J.3
McCune, J.M.4
|