{"id":"https://openalex.org/W4226533605","doi":"https://doi.org/10.1109/tifs.2022.3170274","title":"TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform","display_name":"TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4226533605","doi":"https://doi.org/10.1109/tifs.2022.3170274"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3170274","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3170274","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101956148","display_name":"Yanchu Li","orcid":"https://orcid.org/0000-0001-9873-1888"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanchu Li","raw_affiliation_strings":["School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060586167","display_name":"Lingguang Lei","orcid":"https://orcid.org/0000-0002-1936-0562"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingguang Lei","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101640450","display_name":"Yuewu Wang","orcid":"https://orcid.org/0009-0003-5170-1253"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuewu Wang","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033745290","display_name":"Jiwu Jing","orcid":"https://orcid.org/0000-0002-3409-6149"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Jing","raw_affiliation_strings":["School of Cryptography, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cryptography, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101511274","display_name":"Quan Zhou","orcid":"https://orcid.org/0009-0003-3497-7848"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Quan Zhou","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101956148"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.2652,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.5939717,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"17","issue":null,"first_page":"1709","last_page":"1724"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8457239866256714},{"id":"https://openalex.org/keywords/digital-audio","display_name":"Digital audio","score":0.5503357648849487},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5348068475723267},{"id":"https://openalex.org/keywords/digital-rights-management","display_name":"Digital rights management","score":0.48237720131874084},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36027318239212036},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.21814239025115967},{"id":"https://openalex.org/keywords/audio-signal","display_name":"Audio signal","score":0.19035348296165466},{"id":"https://openalex.org/keywords/digital-signal-processing","display_name":"Digital signal processing","score":0.13035014271736145}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8457239866256714},{"id":"https://openalex.org/C87687168","wikidata":"https://www.wikidata.org/wiki/Q173114","display_name":"Digital audio","level":4,"score":0.5503357648849487},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5348068475723267},{"id":"https://openalex.org/C537843408","wikidata":"https://www.wikidata.org/wiki/Q192532","display_name":"Digital rights management","level":2,"score":0.48237720131874084},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36027318239212036},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.21814239025115967},{"id":"https://openalex.org/C64922751","wikidata":"https://www.wikidata.org/wiki/Q4650799","display_name":"Audio signal","level":3,"score":0.19035348296165466},{"id":"https://openalex.org/C84462506","wikidata":"https://www.wikidata.org/wiki/Q173142","display_name":"Digital signal processing","level":2,"score":0.13035014271736145}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3170274","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3170274","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4536258827","display_name":null,"funder_award_id":"61802398","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8666354793","display_name":null,"funder_award_id":"2020YFB1806205","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W86845558","https://openalex.org/W1553586369","https://openalex.org/W1590929875","https://openalex.org/W1995727142","https://openalex.org/W1997697582","https://openalex.org/W2051384716","https://openalex.org/W2094727373","https://openalex.org/W2096014416","https://openalex.org/W2097723548","https://openalex.org/W2108708552","https://openalex.org/W2143225539","https://openalex.org/W2144183173","https://openalex.org/W2170138789","https://openalex.org/W2175377689","https://openalex.org/W2397035252","https://openalex.org/W2510286124","https://openalex.org/W2584982600","https://openalex.org/W2623662528","https://openalex.org/W2752600319","https://openalex.org/W2831467141","https://openalex.org/W2876125547","https://openalex.org/W2890541097","https://openalex.org/W2972454460","https://openalex.org/W2977766623","https://openalex.org/W3013079115","https://openalex.org/W3037038648","https://openalex.org/W3096346199","https://openalex.org/W4243908662","https://openalex.org/W4251713305","https://openalex.org/W6635234168","https://openalex.org/W6768615862"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2736718217","https://openalex.org/W2372258228","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2159068198","https://openalex.org/W1588399168","https://openalex.org/W2376932109","https://openalex.org/W2071949291"],"abstract_inverted_index":{"Streaming":[0],"music":[1,6,18,37],"has":[2],"dominated":[3],"the":[4,67,78,81,98,117,132,138,143,147,151,158,169,179,184,189,198,203,208,211],"digital":[5],"industry":[7],"in":[8,122,183,188,197],"recent":[9],"years,":[10],"which":[11,41,72],"allows":[12],"users":[13],"to":[14,96,115,201,207],"enjoy":[15],"a":[16,22,89,194,225],"huge":[17],"library":[19],"online":[20],"with":[21,230],"low":[23],"subscription":[24],"price.":[25],"Terminal-side":[26],"audio":[27,91,100,118,153,162,229,238],"DRM":[28,53,92],"(Digital":[29],"Right":[30],"Management)":[31],"is":[32,114],"very":[33,231],"critical":[34],"for":[35,161],"streaming":[36],"industry,":[38],"compromising":[39],"of":[40,80,137,150,178,227,237],"will":[42],"cause":[43],"unrestricted":[44],"listening,":[45],"dumping":[46],"and":[47,106,146,155,165,192,234],"unauthorized":[48],"secondary":[49],"distribution.":[50],"However,":[51],"existing":[52],"protection":[54],"schemes":[55],"mainly":[56],"focus":[57],"on":[58,217],"defeating":[59],"software":[60,104],"attacks":[61,105],"but":[62],"lack":[63],"complete":[64],"shielding":[65],"against":[66,102],"physical":[68,107],"memory":[69,108],"disclosure":[70,109],"attacks,":[71],"may":[73],"even":[74],"be":[75],"launched":[76],"by":[77,127],"owner":[79],"terminal":[82],"device.":[83],"In":[84],"this":[85],"paper,":[86],"we":[87,141,173],"propose":[88],"terminal-side":[90],"solution":[93],"called":[94],"TrustSAMP":[95,222],"protect":[97],"copyrighted":[99],"data":[101,119,148,163],"both":[103],"attacks.":[110],"The":[111,214],"basic":[112],"idea":[113],"process":[116],"plaintext":[120,166],"only":[121,157],"certain":[123],"on-SoC":[124,181],"components":[125,182],"secured":[126],"ARM":[128],"TrustZone.":[129],"To":[130],"minimize":[131],"TCB":[133],"(Trusted":[134],"Computing":[135],"Base)":[136],"secure":[139,170,199],"world,":[140],"separate":[142],"control":[144,202],"flow":[145,149],"Linux":[152],"subsystem":[154],"port":[156],"codes":[159,177],"used":[160],"decryption":[164],"transfer":[167],"into":[168],"world.":[171],"Moreover,":[172],"leave":[174],"most":[175],"driver":[176],"audio-associated":[180],"rich":[185],"OS":[186],"(i.e.,":[187],"normal":[190],"world),":[191],"introduce":[193],"tiny":[195],"proxy":[196],"world":[200],"associated":[204],"registers":[205],"according":[206],"requests":[209],"from":[210],"normal-world":[212],"drivers.":[213],"prototype":[215],"implemented":[216],"real":[218],"hardware":[219],"shows":[220],"that":[221],"can":[223],"play":[224],"variety":[226],"wav-format":[228],"small":[232],"overhead":[233],"negligible":[235],"loss":[236],"quality.":[239]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
