This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Protecting Critical Data
November-December 2007 (vol. 24 no. 6)
pp. 592
Tom Mihm, Motorola
TrustZone technology provides a defense against malicious software attempting to tamper with critical data such as DRM counters. However, it does not prevent an offline rollback attack, which replaces selected current values in flash memory with previous values. Hence, additional protection is needed. This sidebar discusses a defense against rollback attacks that relies on TrustZone technology to provide both a logical partitioning of the flash for secure storage, and a secure execution environment for a special trusted software application.
Index Terms:
TrustZone technology, rollback attack, DRM counters, secure execution environment, trusted software application
Citation:
Tom Mihm, "Protecting Critical Data," IEEE Design & Test of Computers, vol. 24, no. 6, pp. 592, Nov.-Dec. 2007, doi:10.1109/MDT.2007.201
Usage of this product signifies your acceptance of the Terms of Use.