The code executed inside the trusted execution environment can not be viewed or modified, so an attacker would only be able to execute destructive code with complete privileges on the exact same processor. The idea here is to partition the components (memory locations, busses, peripherals, interrupts, and many others) concerning the safe World as … Read More