Search For:

Displaying 1-2 out of 2 total
Protecting Critical Data
Found in: IEEE Design and Test of Computers
By Tom Mihm
Issue Date:November 2007
pp. 592
TrustZone technology provides a defense against malicious software attempting to tamper with critical data such as DRM counters. However, it does not prevent an offline rollback attack, which replaces selected current values in flash memory with previous v...
Implementing Embedded Security on Dual-Virtual-CPU Systems
Found in: IEEE Design and Test of Computers
By Peter Wilson, Alexandre Frey, Tom Mihm, Danny Kershaw, Tiago Alves
Issue Date:November 2007
pp. 582-591
Security requirements for embedded systems such as consumer devices are becoming stronger. Current designs need an isolated environment that stores and processes sensitive data. New hardware technologies are arriving that provide low-cost, high-performance...