Journal of Computer Virology and Hacking Techniques
Latest Publications


TOTAL DOCUMENTS

387
(FIVE YEARS 148)

H-INDEX

18
(FIVE YEARS 3)

Published By Springer-Verlag

2263-8733, 2274-2042

Author(s):  
Babak Sadeghiyan ◽  
Salman Niksefat

Author(s):  
Ron Stajnrod ◽  
Raz Ben Yehuda ◽  
Nezer Jacob Zaidenberg

AbstractARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.


Author(s):  
Anonymous ◽  
Samuel Beckett ◽  
Ian Breakwell ◽  
Alexa Brunet ◽  
Stewart Home ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document