dc.contributor.author | Stajnrod, Ron | |
dc.contributor.author | Ben Yehuda, Raz | |
dc.contributor.author | Zaidenberg, Nezer Jacob | |
dc.date.accessioned | 2022-01-24T06:39:15Z | |
dc.date.available | 2022-01-24T06:39:15Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Stajnrod, R., Ben Yehuda, R., & Zaidenberg, N. J. (2022). Attacking TrustZone on devices lacking memory protection. <i>Journal of Computer Virology and Hacking Techniques</i>, <i>18</i>(3), 259-269. <a href="https://doi.org/10.1007/s11416-021-00413-y" target="_blank">https://doi.org/10.1007/s11416-021-00413-y</a> | |
dc.identifier.other | CONVID_103952880 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/79482 | |
dc.description.abstract | ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer Science and Business Media LLC | |
dc.relation.ispartofseries | Journal of Computer Virology and Hacking Techniques | |
dc.rights | CC BY 4.0 | |
dc.subject.other | TrustZone | |
dc.subject.other | security | |
dc.title | Attacking TrustZone on devices lacking memory protection | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-202201241258 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Engineering | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 259-269 | |
dc.relation.issn | 2263-8733 | |
dc.relation.numberinseries | 3 | |
dc.relation.volume | 18 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © The Author(s) 2021 | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | esineiden internet | |
dc.subject.yso | tietoturva | |
dc.subject.yso | haavoittuvuus | |
dc.subject.yso | sulautettu tietotekniikka | |
dc.subject.yso | verkkohyökkäykset | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27206 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25011 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5461 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
dc.rights.url | https://creativecommons.org/licenses/by/4.0/ | |
dc.relation.doi | 10.1007/s11416-021-00413-y | |
jyx.fundinginformation | Open Access funding provided by University of Jyväskylä (JYU). | |
dc.type.okm | A1 | |