Threat Category: Isolated Execution Environments
Threat Description: Adversaries may use lab equipment to reverse engineer system components.
ARM Security Technology Building a Secure System using TrustZone Technology 1
Assume any device that has been under the physical control of an attacker for any timeframe sufficient to have executed this attack has been permanently compromised and should be transition to the to end-of-lifecycle.
ARM Security Technology Building a Secure System using TrustZone Technology; http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.prd29-genc-009492c/ch01s03s03.html [accessed 8/23/16] ↩