Lines Matching refs:modules
32 relevant sub-modules is created, threats are identified, and
134 modules (SAMs), Trusted Platform Modules (TPMs), and
264 important submodules. For each of the modules, a dedicated architecture
364 naming schemes of modules, functions, variables, and so forth.
452 modules in all of its stages and the management of reported security
463 to minimize the vulnerability of individual modules. While this
466 as countermeasures manually in security-critical modules.
526 mitigate existing weaknesses. Newly developed sub-modules that are
568 This procedure shall be carried out during the design phase of modules
596 invariance** of the cryptographic algorithms and modules is
686 (main-stream Zephyr, security branch, or certain modules), and the