The usage of an architecture described in chapter II-A
makes the execution of type-II malware difficult because the
instructions can be received from instructions memory only.
The storage of the instructions in data-memory is possible,
but these ”instructions” cannot be executed. This requires
a transfer in the instruction memory. The transfer can be
performed only be performed by the security processor. This
transfer reduces the classification of the attack to type-I (see
above). Such a transport enforces check on the security core.
A security core has the potential to identify harmful programs/
code. This will exclude malicious code from execution.