1

A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices
Visualizations and Switching Mechanisms for Security Zones