First, TZ is a hardware based security architecture. It depends on not only ARM 
core level security extension, but SoC enhancement: such as memory controller, 
PMU, ISRAM etc. For specific user scenarios, other peripherals are configured 
into TZ domain. For example, keypad and LCD for secure GUI, LCD and GPU for DRM 
etc.

For TPM, as mentioned above, trust computing group has accepted TZ-based TPM 
certification. I don't think traditional TPM has too many security advantages 
than TZ in general.

For security robustness, it's a case-by-case story. In my opinion, TZ could 
cover most of security requirements in customer electronic devices. If you have 
a design win on US army, maybe it's a different story.

Regards,
Dafu

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/android-security-discuss.
For more options, visit https://groups.google.com/d/optout.

Reply via email to