P. C. Kocher, Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems, Annual International Cryptology Conference, pp.104-113, 1996.

P. Kocher, Differential power analysis, Advances in Cryptology -CRYPTO' 99, pp.388-397, 1999.

K. Gandolfi, Electromagnetic analysis: Concrete results, CHES 2001, pp.251-261, 2001.

. Arm-ltd, ARM Security Technology -Building a Secure System using TrustZone Technology, 2009.

M. Sabt, Trusted execution environment: what it is, and what it is not, 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01246364

J. Ekberg, Trusted execution environments on mobile devices, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp.1497-1498, 2013.

P. Fips, 197, advanced encryption standard (aes), national institute of standards and technology, us department of commerce, 2001.

D. Aboulkassimi, ElectroMagnetic Analysis (EMA) of Software AES on Java Mobile Phones, IEEE Intl. Workshop on Information Forensics and Security -WIFS'11, vol.75, 2011.
URL : https://hal.archives-ouvertes.fr/emse-00651026

J. Longo, Soc it to em: Electromagnetic side-channel attacks on a complex system-on-chip, pp.620-640, 2015.

D. Rosenberg, Unlocking the motorola bootloader, Azimuth Security Blog, 2013.

. Laginimaineb, Exploring qualcomm's trustzone, Bits, Please!, 2015.

A. Tang, CLKSCREW: Exposing the perils of security-oblivious energy management, 26th USENIX Security Symposium (USENIX Security 17), pp.1057-1074, 2017.

N. Zhang, Truspy: Cache side-channel information leakage from the secure world on arm devices, 2016.

B. Kevin, How TrustZone could be bypassed: Side-Channel Attacks on a modern System-on-Chip, Wistp'17, International Conference on Information Security Theory and Practice, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01645398

G. Becker, Test vector leakage assessment (TVLA) methodology in practice, International Conference on Mathematics and Computing, 2013.

, Global Platform Device Technology, TEE Internal Core API Specification, 2013.

D. Genkin, Ecdsa key extraction from mobile devices via nonintrusive physical side channels, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.1626-1638, 2016.

B. L. Welch, The generalization of student's' problem when several different population variances are involved, Biometrika, vol.34, issue.1, pp.28-35, 1947.

E. Brier, C. Clavier, and F. Olivier, Correlation power analysis with a leakage model, pp.16-29, 2004.