暂无分享,去创建一个
Fengyuan Xu | Yunxin Liu | Hao Wu | Shuocheng Wang | Sheng Zhong | Yuhang Gong | Lizhi Sun | Hao Han | Yunxin Liu | Fengyuan Xu | Sheng Zhong | Hao Han | Hao Wu | Yuhang Gong | Lizhi Sun | Shuocheng Wang
[1] Yafeng Yang,et al. MNN: A Universal and Efficient Inference Engine , 2020, MLSys.
[2] Wei Feng,et al. SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE , 2019, CCS.
[3] Jinsoo Jang,et al. PrivateZone: Providing a Private Execution Environment Using ARM TrustZone , 2018, IEEE Transactions on Dependable and Secure Computing.
[4] Yuewu Wang,et al. TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[5] Yong Qi,et al. AppSec: A Safe Execution Environment for Security Sensitive Applications , 2015, VEE.
[6] Klaus Wagner,et al. Flush+Flush: A Fast and Stealthy Cache Attack , 2015, DIMVA.
[7] Laurie J. Hendren,et al. Optimizing Java Bytecode Using the Soot Framework: Is It Feasible? , 2000, CC.
[8] Jennifer Rexford,et al. NoHype: virtualized cloud infrastructure without the virtualization , 2010, ISCA.
[9] Forrest N. Iandola,et al. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <1MB model size , 2016, ArXiv.
[10] Valerio Schiavoni,et al. iperfTZ: Understanding Network Bottlenecks for TrustZone-based Trusted Applications , 2019, SSS.
[11] Andrew Huang,et al. Keeping Secrets in Hardware: The Microsoft Xbox™ Case Study , 2002, CHES.
[12] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[13] Yubin Xia,et al. TEEv: virtualizing trusted execution environments on mobile platforms , 2019, VEE.
[14] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[15] Long Lu,et al. Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps , 2021, USENIX Security Symposium.
[16] Xuanzhe Liu,et al. A First Look at Deep Learning Apps on Smartphones , 2018, WWW.
[17] Tulika Mitra,et al. Automated Partitioning of Android Applications for Trusted Execution Environments , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[18] Wei Song,et al. DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis , 2018, CCS.
[19] Stefan Mangard,et al. Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches , 2015, USENIX Security Symposium.
[20] Markus G. Kuhn,et al. Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP , 1998, IEEE Trans. Computers.
[21] Mark Sandler,et al. MobileNetV2: Inverted Residuals and Linear Bottlenecks , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[22] Yunheung Paek,et al. Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices , 2016, USENIX Annual Technical Conference.
[23] Yunheung Paek,et al. PrOS: Light-Weight Privatized Se cure OSes in ARM TrustZone , 2020, IEEE Transactions on Mobile Computing.
[24] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[25] Ahmad-Reza Sadeghi,et al. SANCTUARY: ARMing TrustZone with User-space Enclaves , 2019, NDSS.
[26] Trent Jaeger,et al. TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone , 2017, MobiSys.
[27] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[28] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[29] Yubin Xia,et al. vTZ: Virtualizing ARM TrustZone , 2017, USENIX Security Symposium.
[30] Pedro Fonseca,et al. SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems , 2020, 2020 IEEE Symposium on Security and Privacy (SP).