Lines Matching refs:security
46 bare-minimum security prerequisites for System-on-Chips (SoC).
169 analysis side-channel attacks represent a category of security threats that
231 | | security implications | |
423 | | where memory corruption security errors can arise. |
459 | | sanitized before being used. These security checks |
497 | | execute code if the proper security mechanisms |
640 | | other security-sensitive processes. By observing |
799 | | when the security check is produced before the time |
888 | | branches that are security sensitive, can be used |
950 environment's security.
966 There are general security assets and threats associated with remote/delegated
967 attestation. However, these are outside the |TF-A| security boundary and
972 System integrators must carefully evaluate the security requirement and
1033 | | can leak to software in different security |
1074 | | security boundaries. An attacker might attempt to |
1220 .. _STRIDE threat analysis technique: https://docs.microsoft.com/en-us/azure/security/develop/threa…
1222 .. _Cache Speculation Side-channels: https://developer.arm.com/support/arm-security-updates/specula…
1223 .. _Spectre: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabi…
1227 … Guidelines: https://trustedfirmware-a.readthedocs.io/en/latest/process/security-hardening.html#se…