Login / Signup
Exploiting RPMB authentication in a closed source TEE implementation.
Aya Fukami
Richard Buurke
Zeno Geradts
Published in:
Forensic Sci. Int. Digit. Investig. (2024)
Keyphrases
</>
social networks
databases
implementation details
implementation issues