I am reading about ARM TrustZone. I read that when the Normal World wants a function from the Secure World, they raise SMC exception which makes a transfer to the Secure World. The thing that I did not understand is what prevents any malicious code from raising the SMC exception? if any unauthorized software can cause a transfer to the Secure World then how is the secure world "secure"?
相关问题
- “Zero out” sensitive String data in Swift
- High cost encryption but less cost decryption
- How to restrict VOB read access in ClearCase (Wind
- Avoid cmake to add the flags -search_paths_first a
- AOSP Build TARGET_PRODUCT fails
相关文章
- Warning : HTML 1300 Navigation occured?
- Security concerns about CORS
- How do I prevent SQL injection with ColdFusion
- socket() returns 0 in C client server application
- LINQ to Entities and SQL Injection
- How to use Google application-specific password in
- Will re-populating a password field in a form be a
- Why are i2c_smbus function not available? (I2C – E
Malicious software can transfer control to the secure world but is unable to manipulate the code in the secure world.
When normal world software request a function from the secure world, the secure world is able to arbitrate whether to perform it or not.
Essentially, if malicious code has taken over the normal world, then its privileges cannot exceed what the normal world code would normally be able to do.