The code executed during the trusted execution environment can't be considered or modified, so an attacker would only manage to execute destructive code with comprehensive privileges on the same processor.
Compliance https://vinnyisqb468270.blogars.com/profile