First, TZ is a hardware based security architecture. It depends on not only ARM core level security extension, but SoC enhancement: such as memory controller, PMU, ISRAM etc. For specific user scenarios, other peripherals are configured into TZ domain. For example, keypad and LCD for secure GUI, LCD and GPU for DRM etc.
For TPM, as mentioned above, trust computing group has accepted TZ-based TPM certification. I don't think traditional TPM has too many security advantages than TZ in general. For security robustness, it's a case-by-case story. In my opinion, TZ could cover most of security requirements in customer electronic devices. If you have a design win on US army, maybe it's a different story. Regards, Dafu -- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/android-security-discuss. For more options, visit https://groups.google.com/d/optout.
