Lines Matching refs:security
200 | | security implications | |
332 | | when the security check is produced before the time |
407 | | conditional branches that are security sensitive, |
547 | | multiple points where memory corruption security |
549 | | security issue since it could allow an attacker |
593 | | sanitized before being used. These security checks |
651 | | security boundaries. An attacker might attempt to |
692 | | execute code if the proper security mechanisms |
780 .. _STRIDE threat analysis technique: https://docs.microsoft.com/en-us/azure/security/develop/threa…
782 .. _Cache Speculation Side-channels: https://developer.arm.com/support/arm-security-updates/specula…
783 .. _Spectre: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabi…
787 … Guidelines: https://trustedfirmware-a.readthedocs.io/en/latest/process/security-hardening.html#se…