2TCG mobile trusted module speeifieation: Version 1.0, Revision 7.02 [ S ]. Beaverton, OR, USA: Trusted Computing Group, 2010.
3ALVES T, FELTON D. TrustZone.- integrated hardware and software security [J].Information Quarterly, 2004, 3 (4) : 18-24.
4AZEMA J, FAYAD G. M-shield mobile security technology: making wireless secure [R]. Dallas, TX, USA: Texas Instrument, 2008.
5DIETRICH K, WINTER J. Towards customizable, application specific mobile trusted modules[C]// Proceedings of the 5th Workshop on Scalable Trusted Computing, October 4, 2010, Chicago, IL, USA: 31-40.
6DWIVEDI H, CLARK C, THIEL D. Mobile application security[M]. New York, NY, USA: McGraw Hill, 2010.
7BUGIEI. S, EKBERG J E. Implementing an application-specific credential platform using late-launched mobile trusted module[C]// Proceedings of the 5th Workshop on Scalable Trusted Computing, October 4, 2010, Chicago, IL, USA: 21-30.
8NAUMAN M, KHAN S, ZHANG X, et al. Beyond kernel- level integrity measurement: enabling remote attestation for the android platform [ C]// Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, June 21-23, 2010, Berlin, Germany: 17p.
9SELLHORST M, STUBLE C, FELDMANN F, et al. Towards a trusted mobile desktop [ C ]// Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, June 21-23, 2010, Berlin, Germany: 7p.