5. Trusted execution environment
In order to respond to attacks targeting the software-to-system layers, presented in the 2 section of this article, one solution is to separate and isolate applications that require security (password management, implementation of cryptographic services, etc.) and applications that do not require any particular security. To achieve this, a trusted execution environment can be implemented, as presented in this section.
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Trusted execution environment
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!