是什么阻止恶意软件在 ARM TrustZone 中引发 SMC 异常? [英] What prevents any malcious software from raising SMC exception in ARM TrustZone?

查看:28
本文介绍了是什么阻止恶意软件在 ARM TrustZone 中引发 SMC 异常?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我正在阅读有关 ARM TrustZone 的信息.我读到当正常世界需要安全世界的功能时,他们会引发 SMC 异常,从而转移到安全世界.我不明白的是什么可以防止任何恶意代码引发 SMC 异常?如果任何未经授权的软件可以导致传输到安全世界,那么安全世界如何安全"?

I am reading about ARM TrustZone. I read that when the Normal World wants a function from the Secure World, they raise SMC exception which makes a transfer to the Secure World. The thing that I did not understand is what prevents any malicious code from raising the SMC exception? if any unauthorized software can cause a transfer to the Secure World then how is the secure world "secure"?

推荐答案

恶意软件可以将控制权转移到安全世界,但无法操纵安全世界中的代码.

Malicious software can transfer control to the secure world but is unable to manipulate the code in the secure world.

当正常世界的软件向安全世界请求一个功能时,安全世界能够仲裁是否执行它.

When normal world software request a function from the secure world, the secure world is able to arbitrate whether to perform it or not.

本质上,如果恶意代码已经接管了正常世界,那么它的权限不能超过正常世界代码通常能够做到的.

Essentially, if malicious code has taken over the normal world, then its privileges cannot exceed what the normal world code would normally be able to do.

这篇关于是什么阻止恶意软件在 ARM TrustZone 中引发 SMC 异常?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆