Breaking the Trust Circle in HarmonyOS by Chaining Multiple Vulnerabilities | IEEE Conference Publication | IEEE Xplore