<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Path Towards Ubiquitous Protection of Media</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>8010 Graz</institution>
          ,
          <country country="AT">Austria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology</institution>
          ,
          <addr-line>In eldgasse 16a, A</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Ronald Toegl</institution>
          ,
          <addr-line>Johannes Winter, and Martin Pirker</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>Mobile devices have become powerful and user-friendly. At the same time they have become a hosting platform for a wide variety of services. Naturally, the interests of the various stakeholders on a mobile platform are not the same. Thus, there is demand for a strict separation model of services on mobile devices. In this paper, we outline a possible approach to enable a Secure Media Path on mobile devices. Our approach aims to support the needs of the di erent stakeholders, with respect to openness, content protection and client privacy. The architecture takes into account the resource constraints of mobile devices.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>A Future Scenario of Media Consumption</title>
      <p>We imagine the capabilities of media consumption in the near-future and
describe it in the following usage scenario: Amadeus has just bought a new
smartphone. On the way home, he explores his new device. Among the pre-installed
apps, Amadeus nds an app for a large cloud provider's payment service and
its movie store. In the App Store, he nds additional applications to access his
bank account at Sparkasse, a bitcoin client, a wallet app, and free apps from
various broadcasters including free-tv and pay-tv networks.</p>
      <p>He launches the Sparkasse App, which uses a speci c, secure part of his
device's screen to display the message provided by Sparkasse. He enters his
account information to access his account. Next he checks the movies available
in the pay-tv video store and picks one. Upon touch of the \Play" button, he
is presented with a menu of payment options, including a service backed by a
federated cloud ID, his account at Sparkasse, and bitcoins. Each account shows
the available amount of money. Amadeus taps the Sparkasse account. When
the screen changes, he immediately recognizes the visual brand of the Sparkasse
app asking him to con rm the payment. The mobile phone indicates that the
Sparkasse app is indeed the authentic origin of the payment dialogue. After
con rmation, the movie starts to stream and play immediately. The bus arrives.
Amadeus sits at the back of the bus and enjoys the rst thirty minutes.</p>
      <p>At home, he puts his new phone on the co ee table and switches on his smart
TV set. As soon as switched on, he sees a menu where he can choose to continue
to watch the current movie scene on the TV set as a 3D movie in 4k quality with
surround sound, without a need to purchase the movie again. While the movie
plays on the smart TV, the phone goes to sleep to conserve battery. His wife
joins in to watch the second half of the movie, when Amadeus's phone rings.
He picks the phone and goes to the other room to have the call. The smart TV
keeps showing the movie so that Amadeus's wife keeps watching it.</p>
      <p>This short story illustrates a number of elements not possible today: First,
the consumer has full control over the selection of content and payment methods.
For privacy-sensitive apps, security is made tangible to the user using a secure
portion of the screen. Use credentials are protected from the rich OS installed
on the mobile device. It is also important to the consumer that media delivery
is seamless across di erent devices, and the mobile device can act as a media
gateway for the home. Di erent devices that display the same media may o er
device-speci c enhanced experiences, and cooperate closely and seamlessly.
Finally, the content that is consumed is well-protected. There is a strong separation
between the protected media content on the device and any apps running on the
rich OS. Without it, a pay-tv provider would not agree to stream their media to
the device. Yet, content protection is transparent to the user. Equally important
to the content providers: they can either provide their content to standard apps
and service providers that handle payment in a transparent way, or provide their
own apps that link into a secure media interface that is the same across devices.
This set of features is not yet possible with current day devices.</p>
    </sec>
    <sec id="sec-3">
      <title>Security Enhanced Platforms</title>
      <p>Modern state-of-the-art platforms provide distinct security support features.
They enable enhanced cryptographic primitives, strictly isolated processing and
(remote) attestation of the platform state. We now give a short overview on
these technologies.</p>
      <p>
        The term Trusted Computing has been mostly established by speci cations
of the Trusted Computing Group (TCG), an industry consortium. The core
component, the Trusted Platform Module (TPM) [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], is a low-cost hardware
security module that is physically bound to its host device. A tamper-resilient
integrated circuit contains implementations for public-key cryptography, key
generation, cryptographic hashing, and random-number generation. The TPM
provides high-level functionality such as collecting and reporting the current system
state, and providing evidence of the integrity and authenticity of this
measurement, known as Remote Attestation. Consequently, a sucessful TPM-enabled
remote attestion of a platform can provide the con dence that the platform is
in the correct state to be host for a secure media path environment.
3.1
      </p>
      <sec id="sec-3-1">
        <title>ARM TrustZone</title>
        <p>
          One of the dominant processor architectures employed in current mobile and
embedded devices is the ARM architecture. Current ARM-based processor designs
span a wide range of application elds, ranging from tiny embedded devices
(e.g. ARM Cortex-M3) to powerful multi-core systems (e.g. ARM Cortex-A9
MPCore). Also, ARM introduced a set of hardware-based security extensions
called TrustZone [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] to ARM processor cores and on-chip components.
        </p>
        <p>The key foundation of ARM TrustZone is the introduction of a secure world
and a non-secure world operating mode. This secure world and non-secure world
mode split is an orthogonal concept to the privileged/unprivileged modes already
found on earlier ARM cores. On a typical ARM TrustZone core, secure world
and non-secure world versions of all privileged and unprivileged processor modes
co-exist. For the purpose of interfacing between secure and non-secure world a
special Secure Monitor Mode together with a Secure Monitor Call instruction
exists. The AMBA AXI bus in a TrustZone enabled system carries extra signals
to indicate the originating world for any bus cycles. Thus, TrustZone aware
System-On-Chip (SoC) peripherals can interpret those extra signals to restrict
access to secure world only; a secure world executive can closely monitor any
non-secure world attempts to access secure world peripherals. To summarise, an
ARM TrustZone CPU core can be seen as two virtual CPU cores with di erent
privileges and a strictly controlled communication interface.
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Trusted Execution Environments</title>
        <p>
          Previously, ARM had published its own TrustZone software API speci cation
[
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Together with Trusted Logic, ARM has developed a closed-source TrustZone
software stack, complementing the TrustZone hardware extensions. ARM has
since donated its TrustZone API to the GlobalPlatform industry association
and this has developed into the Trusted Execution Environment (TEE) Client
API [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. It allows an application in the \non-secure world", which typically runs a
rich-OS such as Google Android or Microsoft Windows Mobile 8, to communicate
with the \secure world". ARM has also been working with other companies to
develop the TEE Internal API [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] that interfaces between a Trusted OS, running
in the secure world and a Trusted Application.
        </p>
        <p>Today, all modern ARM-based Smartphones (Cortex-A CPU based) include
a TEE based on SoCs by manufacturers like Qualcomm, Samsung, Nvidia,
and Texas Instruments. Accordingly, TEEs are already deployed on the eld
since for several years, featuring Trusted OSes currently made by
TrustedLogic/Gemalto (Trusted Foundation) or Giesecke &amp; Devrient (Mobicore).
Moreover, ARM, Gemalto and Giesecke &amp; Devrient and others have recently created
the \Trustonic" Joint Venture on TEE Trusted OS and its ecosystem of services.
3.3</p>
      </sec>
      <sec id="sec-3-3">
        <title>Research on TEEs and TEE Applications</title>
        <p>
          Several scienti c publications deal with proposals for secure mobile and
embedded system designs based on the ARM TrustZone security extensions. Use
of ARM TrustZone hardware to securely manage and execute small programs
(\credentials") were described in [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] and [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. A similar runtime infrastructure
was used by the authors of [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] to implement a mobile trusted platform module.
Similarly [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] proposes a trusted runtime environment utilizing Microsoft's .NET
Framework inside the TrustZone secure world. With the use of a managed
runtime environment the authors try to bene t from the advantages of a high-level
language combined with hardware security and isolation mechanisms provided
by the underlaying platform.
        </p>
        <p>
          A large number of publications deal with possible applications of ARM
TrustZone to implement, for example, digital rights management [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], cryptographic
protocols [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], mobile ticketing [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] and [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], wireless sensor networks [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ], or
anonymous payment for remote cloud service resource consumption [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>
          An approach of using a modi ed Linux kernel acting as secure world
operating system for a mobile virtualization scenario has been discussed in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. This
work showcases an experimental open-source software environment for
experiments with ARM TrustZone in combination with Trusted Computing primitives.
The software framework o ers a prototype kernel running within a trusted
environment and features a software based Trusted Platform Module hosted in
a TrustZone protected runtime environment and an Android operating system
accessing it through a high-level API.
4
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Proposed Architecture</title>
      <p>Media processing is generally a resource intensive task with high demands of
processing power memory and bandwidth, especially with high de nition
material. Traditional, stationary set-top boxes employ various types of smart cards in
combination with specialized system-on-chip and board-level designs to provide
adequate performance as well as protection of content data, which is delivered
and processed on the device. Commonly, these traditional set-top boxes are
closed special-purpose embedded systems with well-de ned restrictions on the
software and con guration changes an end-user of the device is able to perform.
However, on smart phones and tablet computers, users expect to be able to
customize their devices to a great degree, for example by installing all kinds of
third-party applications.</p>
      <p>Typical transformations on the stream include signal processing tasks like
decompression, color-space conversions, equalization of audio signals, and scaling or
rotation of video signals. Current mobile computing platforms often implement
at least parts of these computationally intensive tasks directly in hardware to
reduce the computational requirements and power-consumption of the platform.
To support secure media paths, it is necessary to securely integrate additional
transformation steps in the basic architecture. Such steps include content
decryption and surrounding frameworks like policy engines and key management.
To avoid unintended and unwanted interference between arbitrary applications
running on the platform and the SMP core services, it is necessary to introduce
two separate security domains on the platform. Due to the bandwidth
requirements of high-quality video content, encryption algorithms may be moved into
dedicated hardware blocks.</p>
      <p>l
e
n
r
e
K
rse
U</p>
      <p>Hypervisor</p>
      <p>Secure world
Trusted Services</p>
      <p>Media Path</p>
      <p>Supervisor
Access
control Crypto</p>
      <p>Unprivileged rich OS Kernel
Web Media
browser player</p>
      <p>Other</p>
      <p>Apps
Media Presentation</p>
      <p>Other
Codec Scaling Sigproc.</p>
      <p>Normal world compartments
l
e
n
r
e
K
rse
U
l
e
n
r
e
K
rse
U</p>
      <p>
        We propose to leverage the TrustZone hardware-extensions to establish a
software-based SMP. In our proposed architecture, the components constituting
the core implementation of the SMP itself are protected against direct
interference from malicious applications through software and hardware isolation,
and virtualization techniques. By executing the content processing in domains
isolated from the rest of the system, the use of media-processing software
components provided by the content provider along with the content become possible.
Because media processing is isolated from the rich OS, the interests of the
content provider to protect their content from piracy are preserved. At the same
time, such software is not able to subvert the security and privacy of the user
because it can access the relevant parts of the media pipeline only. Secure
handover between devices can be supported by remote attestation, which can also be
easily done over Bluetooth or Near-Field-Communications [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>ARM TrustZone divides the platform into multiple worlds. The so-called
secure world is controlled by the highly secure and low-complexity trusted OS.
Besides the trusted OS, the platform executes one or multiple instances of a rich
OS such as Android in the so-called normal world. There, playback is controlled
and presented to the user either by specialized apps, or simply in the HTML5
compliant web browser. Thereby, our approach retains compatibility with current
mobile operating systems. Because the secure world is hidden from any software
executed in the normal world, information that is critical for security and privacy
can be protected by processing it in the secure world only. Furthermore, hardware
components that are critical for the SMP can be explicitly assigned to the secure
world, eliminating attack vectors for sni ng high-value content from the normal
world.</p>
      <p>Because the rich operating system cannot be assumed to be free of
securitycritical bugs, it is necessary to address the challenge of a secure channel to
protect the integrity of user input passed to trusted apps.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>We presented our vision and proposal for protecting the presentation of media
in highly mobile and interactive systems. Our approach is motivated through
a future usage scenario which illustrates the interaction of users with several
platforms that seamlessly distribute high- delity media. We have reviewed the
state-of-the art of TrustZone-enabled systems and proposed to leverage it to
establish secure media paths.</p>
      <p>For the future we would like to encourage the community to work together
to reach the manifestation of this vision.</p>
      <p>Acknowledgments. This paper presents an idea and approach that was
contemplated together with Roderick Bloem and Christian Schwarz. This work
was supported by the EC, through project FP7-ICT-STANCE, grant agreement
number 317753, and project DALIA of the AAL joint programme.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. ARM Limited:
          <source>TrustZone API Speci cation v2.0 (June</source>
          <year>2006</year>
          ),
          <fpage>pRD29</fpage>
          -
          <lpage>USGC000089</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>ARM</given-names>
            <surname>Limited: ARM Security Technology</surname>
          </string-name>
          <article-title>Building a Secure System using TrustZone Technology</article-title>
          . http://infocenter.arm.com/help/topic/com.arm.doc. prd29-genc-009492c/
          <fpage>PRD29</fpage>
          -GENC-009492C_
          <article-title>trustzone_security_whitepaper</article-title>
          . pdf (
          <year>2009</year>
          ),
          <fpage>pRD29</fpage>
          -GENC-009492C
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Ekberg</surname>
            ,
            <given-names>J.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Asokan</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kostiainen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rantala</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Scheduling execution of credentials in constrained secure environments</article-title>
          .
          <source>In: Proceedings of the 3rd ACM workshop on Scalable trusted computing</source>
          . pp.
          <volume>61</volume>
          {
          <fpage>70</fpage>
          . STC '08,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2008</year>
          ), http://doi.acm.
          <source>org/10</source>
          .1145/1456455.1456465
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Ekberg</surname>
            ,
            <given-names>J.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bugiel</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Trust in a small package: minimized MRTM software implementation for mobile secure environments</article-title>
          .
          <source>In: Proceedings of the 2009 ACM workshop on Scalable trusted computing</source>
          . pp.
          <volume>9</volume>
          {
          <fpage>18</fpage>
          . STC '09,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2009</year>
          ), http://doi.acm.
          <source>org/10</source>
          .1145/1655108.1655111
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>GlobalPlatform: TEE Client API</surname>
          </string-name>
          <article-title>Speci cation v1.0</article-title>
          . http://www. globalplatform.org/specificationsdevice.asp (
          <year>July 2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>GlobalPlatform: TEE Internal API</surname>
          </string-name>
          <article-title>Speci cation v1.0</article-title>
          . http://www. globalplatform.org/specificationsdevice.asp (
          <year>December 2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Hussin</surname>
            ,
            <given-names>W.H.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Coulton</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Edwards</surname>
          </string-name>
          , R.:
          <article-title>Mobile Ticketing System Employing TrustZone Technology</article-title>
          .
          <source>In: Proceedings of the International Conference on Mobile Business</source>
          . pp.
          <volume>651</volume>
          {
          <fpage>654</fpage>
          . IEEE Computer Society, Washington, DC, USA (
          <year>2005</year>
          ), http://dl.acm.org/citation.cfm?id=
          <volume>1084013</volume>
          .
          <fpage>1084282</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Hussin</surname>
            ,
            <given-names>W.H.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Edwards</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Coulton</surname>
          </string-name>
          , P.:
          <article-title>E-Pass Using DRM in Symbian v8 OS and TrustZone: Securing Vital Data on Mobile Devices</article-title>
          . Mobile Business, International Conference on
          <volume>0</volume>
          ,
          <issue>14</issue>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kostiainen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ekberg</surname>
            ,
            <given-names>J.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Asokan</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rantala</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>On-board credentials with open provisioning</article-title>
          .
          <source>In: Proceedings of the 4th International Symposium on Information, Computer</source>
          , and Communications Security. pp.
          <volume>104</volume>
          {
          <fpage>115</fpage>
          . ASIACCS '09,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2009</year>
          ), http://doi.acm.
          <source>org/10</source>
          .1145/1533057.1533074
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Pirker</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Slamanig</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms</article-title>
          .
          <source>In: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications</source>
          . pp.
          <volume>1155</volume>
          {
          <fpage>1160</fpage>
          . TRUSTCOM '12, IEEE Computer Society, Washington, DC, USA (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Pirker</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Slamanig</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Winter</surname>
          </string-name>
          , J.:
          <article-title>Practical Privacy Preserving Cloud ResourcePayment for Constrained Clients</article-title>
          .
          <source>In: PETS 2012. LNCS</source>
          , vol.
          <volume>7384</volume>
          , pp.
          <volume>201</volume>
          {
          <fpage>220</fpage>
          . Springer Verlag (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Santos</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raj</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saroiu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolman</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Trusted Language Runtime (TLR): Enabling Trusted Applications on Smartphones (</article-title>
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Toegl</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hutter</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>An approach to introducing locality in remote attestation using near eld communications</article-title>
          .
          <source>The Journal of Supercomputing</source>
          <volume>55</volume>
          (
          <issue>2</issue>
          ),
          <volume>207</volume>
          {
          <fpage>227</fpage>
          (
          <year>2011</year>
          ), http://dx.doi.org/10.1007/s11227-010-0407-1
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. Trusted Computing Group:
          <source>TCG TPM Speci cation Version 1.2 rev 113</source>
          (
          <year>2011</year>
          ), https://www.trustedcomputinggroup.org/developers/
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Wachsmann</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dietrich</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , Lohr, H.,
          <string-name>
            <surname>Sadeghi</surname>
            ,
            <given-names>A.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Winter</surname>
          </string-name>
          , J.:
          <article-title>Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices</article-title>
          . In: Burmester,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Tsudik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Magliveras</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Ilic</surname>
          </string-name>
          , I. (eds.)
          <source>Information Security, Lecture Notes in Computer Science</source>
          , vol.
          <volume>6531</volume>
          , pp.
          <volume>84</volume>
          {
          <fpage>98</fpage>
          . Springer Berlin / Heidelberg (
          <year>2011</year>
          ),
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -18178-8 8
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Winter</surname>
          </string-name>
          , J.:
          <article-title>Trusted computing building blocks for embedded linux-based arm trustzone platforms</article-title>
          .
          <source>In: Proceedings of the 3rd ACM workshop on Scalable trusted computing</source>
          . pp.
          <volume>21</volume>
          {
          <fpage>30</fpage>
          . ACM, Alexandria, Virginia, USA (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Yusso</surname>
            ,
            <given-names>Y.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hashim</surname>
          </string-name>
          , H.:
          <article-title>Trusted Wireless Sensor Node Platform</article-title>
          . In: Ao,
          <string-name>
            <given-names>S.I.</given-names>
            ,
            <surname>Gelman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Hukins</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.W.</given-names>
            ,
            <surname>Hunter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Korsunsky</surname>
          </string-name>
          , A.M. (eds.)
          <source>Proceedings of the World Congress on Engineering 2010</source>
          Vol I, WCE '
          <fpage>10</fpage>
          ,
          <string-name>
            <surname>June</surname>
          </string-name>
          30 - July 2,
          <year>2010</year>
          , London, U.K. pp.
          <volume>774</volume>
          {
          <fpage>779</fpage>
          . Lecture Notes in Engineering and Computer Science, International Association of Engineers, Newswood
          <string-name>
            <surname>Limited</surname>
          </string-name>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>