{"id":"https://openalex.org/W2923179852","doi":"https://doi.org/10.1145/3292006.3300035","title":"TruZ-View","display_name":"TruZ-View","publication_year":2019,"publication_date":"2019-03-13","ids":{"openalex":"https://openalex.org/W2923179852","doi":"https://doi.org/10.1145/3292006.3300035","mag":"2923179852"},"language":"en","primary_location":{"id":"doi:10.1145/3292006.3300035","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3292006.3300035","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3292006.3300035","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3292006.3300035","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066179930","display_name":"Kailiang Ying","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kailiang Ying","raw_affiliation_strings":["Syraucse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"Syraucse University, Syracuse, NY, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036522699","display_name":"Priyank Thavai","orcid":null},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Priyank Thavai","raw_affiliation_strings":["Syracuse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047825382","display_name":"Wenliang Du","orcid":"https://orcid.org/0000-0002-9234-0912"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenliang Du","raw_affiliation_strings":["Syracuse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066179930"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.3269,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.80606358,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7640806436538696},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.5634192228317261},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.528412938117981},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.5207393169403076},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.48170000314712524},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.47247928380966187},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4447406828403473},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.415498822927475},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4076696038246155},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.07778477668762207}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7640806436538696},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.5634192228317261},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.528412938117981},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.5207393169403076},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.48170000314712524},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.47247928380966187},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4447406828403473},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.415498822927475},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4076696038246155},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.07778477668762207},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3292006.3300035","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3292006.3300035","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3292006.3300035","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3292006.3300035","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3292006.3300035","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3292006.3300035","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G7826504821","display_name":null,"funder_award_id":"1718086","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2923179852.pdf","grobid_xml":"https://content.openalex.org/works/W2923179852.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1450860479","https://openalex.org/W1486263771","https://openalex.org/W1488216968","https://openalex.org/W1582716752","https://openalex.org/W1605360721","https://openalex.org/W1992661913","https://openalex.org/W2020936921","https://openalex.org/W2097723548","https://openalex.org/W2136566423","https://openalex.org/W2163643194","https://openalex.org/W2512572446","https://openalex.org/W2519934981","https://openalex.org/W2550565492","https://openalex.org/W2578991858","https://openalex.org/W2613975456","https://openalex.org/W2625954429","https://openalex.org/W2700054830","https://openalex.org/W2752600319","https://openalex.org/W2766169223","https://openalex.org/W2831467141","https://openalex.org/W2836641468"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2778153218","https://openalex.org/W1531601525","https://openalex.org/W2728977822","https://openalex.org/W3115073666","https://openalex.org/W3038288694","https://openalex.org/W2135359801","https://openalex.org/W2795123325"],"abstract_inverted_index":{"When":[0],"OS":[1,131,173],"and":[2,23,156,188,212],"hypervisor":[3],"are":[4],"compromised,":[5],"mobile":[6],"devices":[7],"currently":[8],"provide":[9],"a":[10,36,42,61,76,89,111,153,218],"hardware":[11],"protected":[12],"mode":[13],"called":[14,117,164],"Trusted":[15,63],"Execution":[16],"Environment":[17],"(TEE)":[18],"to":[19,53,75,169,177,208,222,246],"guarantee":[20],"the":[21,26,48,83,92,101,105,126,129,135,144,149,159,171,186,189,210,224,227,247],"confidentiality":[22,211],"integrity":[24,213],"of":[25,59,82,91,94,104,128,214,226],"User":[27],"Interface":[28],"(UI).":[29],"The":[30,79],"present":[31],"TEE":[32,106,113,179,187,204,241],"UI":[33,45,97,107,114,132,137,141,150,174,180,183,205,229,242,250],"solutions":[34,138],"adopt":[35],"self-contained":[37,84],"design":[38,57,115,124,147,196],"model,":[39],"which":[40,67],"provides":[41],"fully":[43],"functional":[44],"stack":[46],"in":[47,73,143],"TEE,":[49,145],"but":[50],"they":[51],"fail":[52],"manage":[54],"one":[55],"critical":[56],"principle":[58],"TEE:":[60],"small":[62],"Computing":[64],"Base":[65],"(TCB),":[66],"should":[68],"be":[69,121],"more":[70],"easily":[71],"verified":[72],"comparison":[74],"rich":[77,130,172,190],"OS.":[78,191],"TCB":[80,102,160],"size":[81,93,103],"model":[85,116],"is":[86],"large":[87],"as":[88,152],"result":[90],"an":[95],"individual":[96],"stack.":[98,133],"To":[99,120],"reduce":[100],"solution,":[108],"we":[109,201],"proposed":[110],"novel":[112],"delegation":[118,228],"model.":[119,230],"specific,":[122],"our":[123,146,195,240],"reuses":[125],"majority":[127],"Unlike":[134],"existing":[136,248],"protecting":[139],"3-dimensional":[140],"processing":[142],"protects":[148],"solely":[151],"2-dimensional":[154],"surface":[155],"thus":[157],"reduces":[158],"size.":[161],"Our":[162,231],"system,":[163],"TruZ-View,":[165],"allows":[166],"application":[167,233],"developers":[168,237],"use":[170,206],"development":[175],"environment":[176],"develop":[178],"with":[181,243],"consistent":[182],"looks":[184],"across":[185],"We":[192,216],"successfully":[193],"implemented":[194],"on":[197],"HiKey":[198],"board.":[199],"Moreover,":[200],"developed":[202],"several":[203],"cases":[207],"protect":[209],"UI.":[215],"performed":[217],"thorough":[219],"security":[220,225],"analysis":[221],"prove":[223],"real-world":[232],"evaluation":[234],"shows":[235],"that":[236],"can":[238],"leverage":[239],"few":[244],"changes":[245],"app's":[249],"logic.":[251]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-04-01T00:00:00"}
