5. Trusted execution environment
In order to respond to attacks targeting the system's software layers, presented in the 2 section of this article, one solution is to separate and isolate applications that require security (password management, implementation of cryptographic services, etc.) from applications that do not require any particular security. To achieve this, a trusted execution environment can be implemented, as presented in this section.
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Trusted execution environment
Article included in this offer
"Software technologies and System architectures"
(
227 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!