| skipped 18 lines |
19 | 19 | | - http://sefcom.asu.edu/publications/trustzone-explained-cic2016.pdf |
20 | 20 | | |
21 | 21 | | - Trustworthy Execution on Mobile Devices |
22 | | - | - https://netsec.ethz.ch/publications/papers/paper-hyperphone-TRUST-2012.pdf |
| 22 | + | - https://netsec.ethz.ch/publications/papers/paper-hyperphone-TRUST-2012.pdf |
23 | 23 | | |
| 24 | + | - A Deep Dive into Samsung's trustzone (Part 1 - intro) |
| 25 | + | - https://blog.quarkslab.com/a-deep-dive-into-samsungs-trustzone-part-1.html |
24 | 26 | | |
25 | 27 | | # TEE Exploits/Security Analysis |
26 | 28 | | |
| skipped 233 lines |