Login / Signup
Attacking TrustZone on devices lacking memory protection.
Ron Stajnrod
Raz Ben Yehuda
Nezer Jacob Zaidenberg
Published in:
J. Comput. Virol. Hacking Tech. (2022)
Keyphrases
</>
information security
mobile devices
memory usage
memory requirements
low memory
main memory
data mining
memory management
random access
intelligent environments
smart phones
computational power
mobile phone
memory space
limited memory
high speed
memory size
data sets