Lines Matching refs:model
7 This document provides a threat model of TF-A firmware for platforms with Arm
18 In this threat model, the target of evaluation is the Trusted Firmware for
31 recommended by `Arm CCA security model`_:
40 These are requirements of the `Arm CCA security model`_:
48 Note that this threat model hardens *[R0149]* requirement by forbidding to
56 This is a requirement of the `Arm CCA security model`_:
68 These are requirements of the `Arm CCA security model`_:
84 model of the different components of a TF-A-based system and their interactions
120 In this threat model, we use the same method to analyse threats as in the
129 identified in this threat model will only be given a risk rating for this
139 threat model. Only deltas are pointed out.
177 this threat model. Only deltas are pointed out.
199 of this threat model. Only deltas are pointed out.