Näytä suppeat kuvailutiedot

dc.contributor.authorStajnrod, Ron
dc.contributor.authorBen Yehuda, Raz
dc.contributor.authorZaidenberg, Nezer Jacob
dc.date.accessioned2022-01-24T06:39:15Z
dc.date.available2022-01-24T06:39:15Z
dc.date.issued2022
dc.identifier.citationStajnrod, R., Ben Yehuda, R., & Zaidenberg, N. J. (2022). Attacking TrustZone on devices lacking memory protection. <i>Journal of Computer Virology and Hacking Techniques</i>, <i>18</i>(3), 259-269. <a href="https://doi.org/10.1007/s11416-021-00413-y" target="_blank">https://doi.org/10.1007/s11416-021-00413-y</a>
dc.identifier.otherCONVID_103952880
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/79482
dc.description.abstractARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer Science and Business Media LLC
dc.relation.ispartofseriesJournal of Computer Virology and Hacking Techniques
dc.rightsCC BY 4.0
dc.subject.otherTrustZone
dc.subject.othersecurity
dc.titleAttacking TrustZone on devices lacking memory protection
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202201241258
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineEngineeringen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange259-269
dc.relation.issn2263-8733
dc.relation.numberinseries3
dc.relation.volume18
dc.type.versionpublishedVersion
dc.rights.copyright© The Author(s) 2021
dc.rights.accesslevelopenAccessfi
dc.subject.ysoesineiden internet
dc.subject.ysotietoturva
dc.subject.ysohaavoittuvuus
dc.subject.ysosulautettu tietotekniikka
dc.subject.ysoverkkohyökkäykset
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p27206
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p25011
jyx.subject.urihttp://www.yso.fi/onto/yso/p5461
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
dc.rights.urlhttps://creativecommons.org/licenses/by/4.0/
dc.relation.doi10.1007/s11416-021-00413-y
jyx.fundinginformationOpen Access funding provided by University of Jyväskylä (JYU).
dc.type.okmA1


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY 4.0