Attacking TrustZone on devices lacking memory protection

6Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.

Author supplied keywords

Cite

CITATION STYLE

APA

Stajnrod, R., Ben Yehuda, R., & Zaidenberg, N. J. (2022). Attacking TrustZone on devices lacking memory protection. Journal of Computer Virology and Hacking Techniques, 18(3), 259–269. https://doi.org/10.1007/s11416-021-00413-y

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free