Login / Signup

Exploiting RPMB authentication in a closed source TEE implementation.

Aya FukamiRichard BuurkeZeno Geradts
Published in: Forensic Sci. Int. Digit. Investig. (2024)
Keyphrases
  • social networks
  • databases
  • implementation details
  • implementation issues