Threat Category: Isolated Execution Environments
ID: STA-14
Threat Description: Adversaries may use lab equipment to reverse engineer system components.
Threat Origin
ARM Security Technology Building a Secure System using TrustZone Technology 1
Exploit Examples
Not Applicable
CVE Examples
Not Applicable
Possible Countermeasures
Assume any device that has been under the physical control of an attacker for any timeframe sufficient to have executed this attack has been permanently compromised and should be transition to the to end-of-lifecycle.
References
ARM Security Technology Building a Secure System using TrustZone Technology; http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.prd29-genc-009492c/ch01s03s03.html [accessed 8/23/16] ↩