是什么阻止了任何恶意软件在ARM TrustZone中引发SMC异常? [英] What prevents any malcious software from raising SMC exception in ARM TrustZone?

查看:264
本文介绍了是什么阻止了任何恶意软件在ARM TrustZone中引发SMC异常?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我正在阅读有关ARM TrustZone的文章.我读到,当正常世界"要从安全世界"中获取功能时,它们会引发SMC异常,从而转移到安全世界"中.我不明白的是,是什么阻止了任何恶意代码引发SMC异常?如果任何未经授权的软件可以导致转移到安全世界,那么安全世界如何安全"?

I am reading about ARM TrustZone. I read that when the Normal World wants a function from the Secure World, they raise SMC exception which makes a transfer to the Secure World. The thing that I did not understand is what prevents any malicious code from raising the SMC exception? if any unauthorized software can cause a transfer to the Secure World then how is the secure world "secure"?

推荐答案

恶意软件可以将控制权转移到安全世界,但无法在安全世界中操纵代码.

Malicious software can transfer control to the secure world but is unable to manipulate the code in the secure world.

当普通世界软件向安全世界请求功能时,安全世界可以仲裁是否执行该功能.

When normal world software request a function from the secure world, the secure world is able to arbitrate whether to perform it or not.

本质上,如果恶意代码已经占领了正常世界,那么它的特权就不会超过正常世界代码通常能够做到的.

Essentially, if malicious code has taken over the normal world, then its privileges cannot exceed what the normal world code would normally be able to do.

这篇关于是什么阻止了任何恶意软件在ARM TrustZone中引发SMC异常?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆