Changes

22 bytes removed ,  15:08, 20 June 2017
Line 21: Line 21:  
|-
 
|-
 
|}
 
|}
==ARM TrustZone software==
+
 
===ARM TrustZone===
+
== System software ==
 +
=== Kernel ===
 
{| class="wikitable" border="1"
 
{| class="wikitable" border="1"
 
|-
 
|-
Line 34: Line 35:  
!  Discovered by
 
!  Discovered by
 
|-
 
|-
|  No public ARM TrustZone exploits  
+
|  No public Kernel exploits  
 
|
 
|
 
|
 
|
Line 44: Line 45:  
|-
 
|-
 
|}
 
|}
== System software==
+
 
===Kernel===
+
=== TrustZone ===
 
{| class="wikitable" border="1"
 
{| class="wikitable" border="1"
 
|-
 
|-
Line 57: Line 58:  
!  Discovered by
 
!  Discovered by
 
|-
 
|-
|  No public Kernel exploits  
+
|  No public ARM TrustZone exploits  
 
|
 
|
 
|
 
|
Line 68: Line 69:  
|}
 
|}
   −
===System Modules===
+
=== System Modules ===
 
{| class="wikitable" border="1"
 
{| class="wikitable" border="1"
 
|-
 
|-