參考文獻 |
[1] “Spacex limits ukraine’s military use of starlink satellite business. the wall street journal.” 2022, https://www.wsj.com/articles/spacex-to-limit-ukraines-military- use-of-starlink-satellite-business-11675894401.
[2] L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy, “Privilege escalation at- tacks on android,” in Information Security, M. Burmester, G. Tsudik, S. Magliveras, and I. Ilić, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 346–360.
[3] C. Cowan, F. Wagle, C. Pu, S. Beattie, and J. Walpole, “Buffer overflows: attacks and defenses for the vulnerability of the decade,” in Proceedings DARPA Information Survivability Conference and Exposition. DISCEX’00, vol. 2, 2000, pp. 119–129 vol.2.
[4] M. Lentz, R. Sen, P. Druschel, and B. Bhattacharjee, “Secloak: Arm trustzone- based mobile peripheral control,” in Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys ’18. New York, NY, USA: Association for Computing Machinery, 2018, p. 1–13. [Online]. Available: https://doi.org/10.1145/3210240.3210334
[5] “Trustzone,” https://www.arm.com/products/security-on-arm/trustzone.
[6] K. Ying, A. Ahlawat, B. Alsharifi, Y. Jiang, P. Thavai, and W. Du, “Truz-droid: Integrating trustzone with mobile operating system,” in Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys ’18. New York, NY, USA: Association for Computing Machinery, 2018, p. 14–27. [Online]. Available: https://doi.org/10.1145/3210240.3210338
[7] T. Van Eyck, H. Trimech, S. Michiels, D. Hughes, M. Salehi, H. Janjuaa, and T.-L. Ta, “Mr-tee: Practical trusted execution of mixed-criticality code,” in Proceedings of the 24th International Middleware Conference: Industrial Track, ser. Middleware ’23. New York, NY, USA: Association for Computing Machinery, 2023, p. 22–28. [Online]. Available: https://doi.org/10.1145/3626562.3626831
[8] R. Liu and M. Srivastava, “Protc: Protecting drone’s peripherals through arm trustzone,” in Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications, ser. DroNet ’17. New York, NY, USA: Association for Computing Machinery, 2017, p. 1–6. [Online]. Available: https://doi.org/10.1145/3086439.3086443
[9] S.Park,J.Park,andJ.Oh,“Designandimplementationoftrustedsensingframework for iot environment,” Journal of Communications and Networks, vol. 23, no. 1, pp. 43–52, 2021.
[10] S. Hu, Q. A. Chen, J. Joung, C. Carlak, Y. Feng, Z. M. Mao, and H. X. Liu, “Cvshield: Guarding sensor data in connected vehicle with trusted execution environment,” in Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, ser. AutoSec ’20. New York, NY, USA: Association for Computing Machinery, 2020, p. 1–4. [Online]. Available: https://doi.org/10.1145/3375706.3380552
[11] Z. Li, D. Mashima, W. S. Ong, E. Esiner, Z. Kalbarczyk, and E.-C. Chang, “On practicality of using arm trustzone trusted execution environment for securing programmable logic controllers,” in Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ser. ASIA CCS ’24. New York, NY, USA: Association for Computing Machinery, 2024, p. 947–961. [Online]. Available: https://doi.org/10.1145/3634737.3645002
[12] “Linaro. op-tee home.” https://www.op-tee.org/.
[13] J. Burke, P. Gasti, N. Nathan, and G. Tsudik, “Secure sensing over named data net- working,” in 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014, pp. 175–180.
[14] K. Harley and R. Cooper, “Information integrity: Are we there yet?” ACM Comput. Surv., vol. 54, no. 2, feb 2021. [Online]. Available: https://doi.org/10.1145/3436817
[15] P. Papadimitratos and A. Jovanovic, “Gnss-based positioning: Attacks and counter- measures,” in MILCOM 2008 - 2008 IEEE Military Communications Conference, 2008, pp. 1–7.
[16] L. Guo and F. X. Lin, “Minimum viable device drivers for arm trustzone,” in Proceedings of the Seventeenth European Conference on Computer Systems, ser. EuroSys ’22. New York, NY, USA: Association for Computing Machinery, 2022, p. 300–316. [Online]. Available: https://doi.org/10.1145/3492321.3519565
[17] K. Ying, P. Thavai, and W. Du, “Truz-view: Developing trustzone user interface for mobile os using delegation integration model,” in Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, ser. CODASPY
’19. New York, NY, USA: Association for Computing Machinery, 2019, p. 1–12. [Online]. Available: https://doi.org/10.1145/3292006.3300035
[18] “The national marine electronics association (nmea).” https://github.com/OP-TEE/ optee_test.
[19] D. Ma, A. K. Prasad, N. Saxena, and T. Xiang, “Location-aware and safer cards: enhancing rfid security and privacy via location sensing,” in Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, ser. WISEC ’12. New York, NY, USA: Association for Computing Machinery, 2012, p. 51–62. [Online]. Available: https://doi.org/10.1145/2185448.2185457
[20] “sysstat - system performance tools for the linux operating system.” https://github. com/sysstat/sysstat.
[21] “sysbench.” https://github.com/akopytov/sysbench.
[22] “Op-tee sanity testsuite.” https://www.nmea.org/nmea-0183.html.
[23] S. Mirzamohammadi and A. Amiri Sani, “Viola: Trustworthy sensor notifications for enhanced privacy on mobile systems,” in Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys ’16. New York, NY, USA: Association for Computing Machinery, 2016, p. 263–276. [Online]. Available: https://doi.org/10.1145/2906388.2906391 |