REFERENCES
Alipay (2020). Alipay. https://intl.alipay.com/.
Axelsson, S. (2000). Intrusion detection systems: A survey
and taxonomy. Technical report, Technical report.
BitCoin (2020). BitCoin Ledger. https://www.ledgerwallet.
com/beta/trustlet/.
Boneh, D., Inguva, S., and Baker, I. (2007). SSL MITM
Proxy. http://crypto.stanford.edu/ssl-mitm/.
Bugiel, S., Dmitrienko, A., Kostiainen, K., Sadeghi, A.-
R., and Winandy, M. (2010). TruWalletM: Secure
web authentication on mobile platforms. In Inter-
national Conference on Trusted Systems, pages 219–
236. Springer.
Chapweske, A. (2003). The PS/2 mouse/keyboard proto-
col. electronic file available: http://www.computer-
engineering.org/ps2protocol.
Costan, V. and Devadas, S. (2016). Intel SGX Explained.
IACR Cryptol. ePrint Arch., 2016(86):1–118.
Deshane, T., Shepherd, Z., Matthews, J., Ben-Yehuda, M.,
Shah, A., and Rao, B. (2008). Quantitative compari-
son of Xen and KVM. Xen Summit, Boston, MA, USA,
pages 1–2.
Gandotra, E., Bansal, D., and Sofat, S. (2014). Malware
analysis and classification: A survey. Journal of In-
formation Security, 2014.
Hirano, M., Umeda, T., Okuda, T., Kawai, E., and Yam-
aguchi, S. (2009). T-pim: Trusted password input
method against data stealing malware. In 2009 Sixth
International Conference on Information Technology:
New Generations, pages 429–434. IEEE.
Hussain, M., Al-Haiqi, A., Zaidan, A., Zaidan, B., Kiah,
M. M., Anuar, N. B., and Abdulnabi, M. (2016). The
rise of keyloggers on smartphones: A survey and in-
sight into motion-based tap inference attacks. Perva-
sive and Mobile Computing, 25:1–25.
Kiperberg, M., Leon, R., Resh, A., Algawi, A., and Zaiden-
berg, N. J. (2019). Hypervisor-based Protection of
Code. IEEE Transactions on Information Forensics
and Security, 14(8):2203–2216.
Knox, S. (2013). White paper: An overview of samsung
knox.
Leon, R. S., Kiperberg, M., Zabag, A. A. L., Resh, A., Al-
gawi, A., and Zaidenberg, N. J. (2019). Hypervisor-
Based White Listing of Executables. IEEE Security &
Privacy, 17(5):58–67.
Li, X., Hu, H., Bai, G., Jia, Y., Liang, Z., and Saxena,
P. (2014). DroidVault: A trusted data vault for An-
droid devices. In 2014 19th International Conference
on Engineering of Complex Computer Systems, pages
29–38. IEEE.
Liu, D. and Cox, L. P. (2014). Veriui: Attested login for mo-
bile devices. In Proceedings of the 15th Workshop on
Mobile Computing Systems and Applications, pages
1–6.
Microsoft (2012). Requirements for Implementing the
Microsoft Hypervisor Interface. MSDN, [On-
line]. Available: https://docs.microsoft.com/en-
us/virtualization/hyper-v-on-windows/reference/tlfs
.[Accessed Oct 2020].
Neiger, G., Santoni, A., Leung, F., Rodgers, D., and Uhlig,
R. (2006). Intel Virtualization Technology: Hardware
Support for Efficient Processor Virtualization. Intel
Technology Journal, 10(3).
Pfoh, J., Schneider, C., and Eckert, C. (2011). Nitro:
Hardware-based system call tracing for virtual ma-
chines. In International Workshop on Security, pages
96–112. Springer.
Pinto, S. and Santos, N. (2019). Demystifying ARM Trust-
Zone: A comprehensive survey. ACM Computing Sur-
veys (CSUR), 51(6):1–36.
Rescorla, E. et al. (2000). Http over tls.
Rosenbaum, A., Biham, E., and Bitan, S. (2019). Trusted
Execution Environments. PhD thesis, Computer Sci-
ence Department, Technion.
Rubinov, K., Rosculete, L., Mitra, T., and Roychoudhury,
A. (2016). Automated partitioning of android appli-
cations for trusted execution environments. In 2016
IEEE/ACM 38th International Conference on Soft-
ware Engineering (ICSE), pages 923–934. IEEE.
Samsung (2020). Samsung Pay. http://www.samsung.com/
us/samsung-pay/.
Seshadri, A., Luk, M., Qu, N., and Perrig, A. (2007). SecVi-
sor: A tiny hypervisor to provide lifetime kernel code
integrity for commodity OSes. In Proceedings of
twenty-first ACM SIGOPS symposium on Operating
systems principles, pages 335–350.
Sharma, R. K., Kalita, H. K., and Issac, B. (2014). Different
firewall techniques: A survey. In Fifth International
Conference on Computing, Communications and Net-
working Technologies (ICCCNT), pages 1–6. IEEE.
Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K.,
Hasegawa, S., Horie, T., Hirano, M., Kourai, K.,
Oyama, Y., Kawai, E., et al. (2009). Bitvisor: a
thin hypervisor for enforcing i/o device security. In
Proceedings of the 2009 ACM SIGPLAN/SIGOPS in-
ternational conference on Virtual execution environ-
ments, pages 121–130.
Sibai, F. N. (2008). Evaluating the performance of sin-
gle and multiple core processors with PCMARK
R
05
and benchmark analysis. ACM SIGMETRICS Perfor-
mance Evaluation Review, 35(4):62–71.
Solovev, A. (2020). GitHub Gloc. https:
//chrome.google.com/webstore/detail/github-gloc/
kaodcnpebhdbpaeeemkiobcokcnegdki.
Ying, K., Ahlawat, A., Alsharifi, B., Jiang, Y., Thavai, P.,
and Du, W. (2018). Truz-droid: Integrating trustzone
with mobile operating system. In Proceedings of the
16th annual international conference on mobile sys-
tems, applications, and services, pages 14–27.
Zimmer, R. (2009). Hale,“UEFI: From Reset Vector to Op-
erating System,” Chapter 3 of Hardware-Dependent
Software.
HyperPass: Secure Password Input Platform
587