Mobile Threat Catalogue

Reverse Engineering Components

Contribute

Threat Category: Isolated Execution Environments

ID: STA-14

Threat Description: Adversaries may use lab equipment to reverse engineer system components.

Threat Origin

ARM Security Technology Building a Secure System using TrustZone Technology 1

Exploit Examples

Not Applicable

CVE Examples

Not Applicable

Possible Countermeasures

Enterprise

Assume any device that has been under the physical control of an attacker for any timeframe sufficient to have executed this attack has been permanently compromised and should be transition to the to end-of-lifecycle.

References

  1. ARM Security Technology Building a Secure System using TrustZone Technology; http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.prd29-genc-009492c/ch01s03s03.html [accessed 8/23/16]