Lines Matching refs:access
77 | DF3 | | Debug and trace IP on a platform can allow access |
152 | AppDebug | | Physical attacker using debug signals to access |
155 | PhysicalAccess | | Physical attacker having access to external device |
263 that require physical access are unlikely in server environments while
461 | | access memory beyond its limit. |
490 | | access sensitive data, execute arbitrary |
491 | | code or access otherwise restricted HW |
496 | | normal world to access sensitive data or even |
519 | Mitigations | When configuring access permissions, the |
549 | | gains access to memory due to a vulnerability. |
705 | | storage. It is possible for an attacker to access|
839 | Threat | | **An attacker with physical access can execute |
852 | | achieved with physical access to the device by |
944 against unauthorized access by malicious actors through the use of one-time
958 Measured Boot. This vulnerability requires physical access to the host machine.
989 | | | Secure and non-secure clients access TF-A services |