Threat Category: Isolated Execution Environments
Threat Description: Adversaries that are able to reverse engineer parts of the TEE may gain access to cryptographic secrets and other sensitive information.
ARM Security Technology Building a Secure System using TrustZone Technology 1
Assume any device that has been under the physical control of an attacker for any timeframe sufficient to have executed this attack has been permanently compromised and should be transitioned to end-of-lifecycle.
ARM Security Technology Building a Secure System using TrustZone Technology; http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.prd29-genc-009492c/ch01s03s03.html [accessed 8/23/16] ↩