{"id":"https://openalex.org/W4281481999","doi":"https://doi.org/10.48550/arxiv.2205.10963","title":"Protecting File Activities via Deception for ARM TrustZone","display_name":"Protecting File Activities via Deception for ARM TrustZone","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4281481999","doi":"https://doi.org/10.48550/arxiv.2205.10963"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2205.10963","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"posted-content","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/abs/2205.10963","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101501230","display_name":"Liwei Guo","orcid":"https://orcid.org/0000-0002-3267-1285"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guo, Liwei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5025585492","display_name":"Felix Xiaozhu Lin","orcid":"https://orcid.org/0000-0002-1615-6419"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lin, Felix Xiaozhu","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":60},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9977,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5359875},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5082466}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8143977},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5359875},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5082466},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.50082827},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.47431776},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.47216675},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40486333},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.094964415},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2205.10963","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://api.datacite.org/dois/10.48550/arxiv.2205.10963","pdf_url":null,"source":{"id":"https://openalex.org/S4393179698","display_name":"DataCite API","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I4210145204","host_organization_name":"DataCite","host_organization_lineage":["https://openalex.org/I4210145204"],"host_organization_lineage_names":["DataCite"],"type":"metadata"},"license":null,"license_id":null,"version":null}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2205.10963","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"score":0.75,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W67940504","https://openalex.org/W4308699695","https://openalex.org/W4224216661","https://openalex.org/W3210347767","https://openalex.org/W2596984206","https://openalex.org/W2152144666","https://openalex.org/W2066014542","https://openalex.org/W2024170198","https://openalex.org/W1819617256","https://openalex.org/W1507511632"],"abstract_inverted_index":{"A":[0],"TrustZone":[1],"TEE":[2,61,71,82,96,121],"often":[3],"invokes":[4],"an":[5],"external":[6],"filesystem.":[7],"While":[8],"filedata":[9],"can":[10,17,153],"be":[11],"encrypted,":[12],"the":[13,22,26,42,45,57,60,70,81,84,93,95,102,120,123,127,199],"revealed":[14],"file":[15,23,39,47,67,183],"activities":[16,24,40,79,184],"leak":[18],"secrets.":[19],"To":[20,55,76,115],"hide":[21],"from":[25,69,129],"filesystem":[27,89,117,160],"and":[28,149],"its":[29],"OS,":[30],"we":[31],"propose":[32],"Enigma,":[33],"a":[34,143,178],"deception-based":[35],"defense":[36],"injecting":[37],"sybil":[38,63,78],"as":[41,156,158],"cover":[43],"of":[44,164,195,202],"actual":[46,103],"activities.":[48],"Enigma":[49,135,181],"contributes":[50],"three":[51],"new":[52],"designs.":[53],"(1)":[54],"make":[56,77],"deception":[58],"credible,":[59],"generates":[62],"calls":[64,68],"by":[65,109,192],"replaying":[66],"code":[72],"under":[73],"protection.":[74],"(2)":[75],"cheap,":[80],"requests":[83],"OS":[85,128],"to":[86,171],"run":[87,155],"K":[88],"images":[90,108,124,161],"simultaneously.":[91],"Concealing":[92],"disk,":[94],"backs":[97],"only":[98,110],"one":[99,193],"image":[100,118,132],"with":[101,137,147,162,185],"disk":[104,165],"while":[105,197],"backing":[106],"other":[107],"storing":[111],"their":[112],"metadata.":[113],"(3)":[114],"protect":[116],"identities,":[119],"shuffles":[122],"frequently,":[125],"preventing":[126],"observing":[130],"any":[131],"for":[133,174],"long.":[134],"works":[136],"unmodified":[138],"filesystems":[139],"shipped":[140],"withLinux.":[141],"On":[142],"low-cost":[144],"Arm":[145],"SoC":[146],"EXT4":[148],"F2FS,":[150],"our":[151],"system":[152],"concurrently":[154],"many":[157],"50":[159],"1%":[163],"overhead":[166],"per":[167],"additional":[168],"image.":[169],"Compared":[170],"common":[172],"obfuscation":[173],"hiding":[175],"addresses":[176],"in":[177],"flat":[179],"space,":[180],"hides":[182],"richer":[186],"semantics.":[187],"Its":[188],"cost":[189],"is":[190],"lower":[191],"order":[194],"magnitude":[196],"achieving":[198],"same":[200],"level":[201],"probabilistic":[203],"security":[204],"guarantees.":[205]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4281481999","counts_by_year":[],"updated_date":"2025-01-21T06:44:14.265839","created_date":"2022-05-26"}