Fig. 8From: Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokesWorkflow and data paths under the IM-Visor protection. For sensitive keystrokes as shown in red color, a trusted path from the secure touch screen to a user app is created by the STIE and commit-proxy. For non-sensitive keystrokes, the Replay Executor dispatches them to the targeted IME appBack to article page