Abstract
ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.
Original language | English |
---|---|
Pages (from-to) | 259-269 |
Number of pages | 11 |
Journal | Journal of Computer Virology and Hacking Techniques |
Volume | 18 |
Issue number | 3 |
DOIs | |
State | Published - Sep 2022 |
Externally published | Yes |
Keywords
- Security
- TrustZone