Threat Category: Isolated Execution Environments
ID: STA-13
Threat Description: Adversaries that are able to reverse engineer parts of the TEE may gain access to cryptographic secrets and other sensitive information.
Threat Origin
ARM Security Technology Building a Secure System using TrustZone Technology 1
Exploit Examples
Not Applicable
CVE Examples
Not Applicable
Possible Countermeasures
Assume any device that has been under the physical control of an attacker for any timeframe sufficient to have executed this attack has been permanently compromised and should be transitioned to end-of-lifecycle.
References
ARM Security Technology Building a Secure System using TrustZone Technology; http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.prd29-genc-009492c/ch01s03s03.html [accessed 8/23/16] ↩