Arm Community
Arm Community
  • Site
  • User
  • Site
  • Search
  • User
  • Groups
    • Research Collaboration and Enablement
    • DesignStart
    • Education Hub
    • Innovation
    • Open Source Software and Platforms
  • Forums
    • AI and ML forum
    • Architectures and Processors forum
    • Arm Development Platforms forum
    • Arm Development Studio forum
    • Arm Virtual Hardware forum
    • Automotive forum
    • Compilers and Libraries forum
    • Graphics, Gaming, and VR forum
    • High Performance Computing (HPC) forum
    • Infrastructure Solutions forum
    • Internet of Things (IoT) forum
    • Keil forum
    • Morello Forum
    • Operating Systems forum
    • SoC Design and Simulation forum
    • 中文社区论区
  • Blogs
    • AI and ML blog
    • Announcements
    • Architectures and Processors blog
    • Automotive blog
    • Graphics, Gaming, and VR blog
    • High Performance Computing (HPC) blog
    • Infrastructure Solutions blog
    • Innovation blog
    • Internet of Things (IoT) blog
    • Operating Systems blog
    • Research Articles
    • SoC Design and Simulation blog
    • Tools, Software and IDEs blog
    • 中文社区博客
  • Support
    • Arm Support Services
    • Documentation
    • Downloads
    • Training
    • Arm Approved program
    • Arm Design Reviews
  • Community Help
  • More
  • Cancel
Arm Community blogs
Arm Community blogs
Architectures and Processors blog Designing secure IoT devices starts with a secure boot
  • Blogs
  • Mentions
  • Sub-Groups
  • Tags
  • Jump...
  • Cancel
More blogs in Arm Community blogs
  • AI and ML blog

  • Announcements

  • Architectures and Processors blog

  • Automotive blog

  • Embedded blog

  • Graphics, Gaming, and VR blog

  • High Performance Computing (HPC) blog

  • Infrastructure Solutions blog

  • Internet of Things (IoT) blog

  • Operating Systems blog

  • SoC Design and Simulation blog

  • Tools, Software and IDEs blog

Tell us what you think
Tags
  • White Paper
  • Embedded
  • TrustZone for Armv8-M
  • Cortex-M
  • Cortex-M33
  • NXP
  • Internet of Things (IoT)
Actions
  • RSS
  • More
  • Cancel
Related blog posts
Related forum threads

Designing secure IoT devices starts with a secure boot

Diya Soubra
Diya Soubra
July 31, 2017
2 minute read time.

Last week, I had the pleasure of taking part in an embedded security webinar called “Designing secure IoT devices starts with a secure boot”, hosted by one of our silicon partners, NXP. I presented alongside Donnie Garcia, Solutions Architect for Secure Transactions at NXP.

Highly engaged audience for our technical security webinar

It was our most popular joint webinar to date, with the large majority of those who attended staying engaged until the end. If that does not attest to the quality of the content, then I do not know what does!

The webinar covered in practical details how to:

  • Manage the life cycle of an IoT edge node from development to deployment
  • Leverage hardware and software offerings available for the Kinetis MCU portfolio, designed to help protect against attacks
  • Ease the burden of future secure IoT edge node development using new processors and architectures from Arm

Focus: Kinetis K28F MCU and Arm TrustZone for Armv8-M

The webinar kicked off strong with Donnie covering the secure boot solution for the Kinetis K28F MCU, using mbed TLS for cryptography and the KBOOT tools. Then, I introduced TrustZone for Armv8-M as the foundation of all future secure embedded designs, building on the success of TrustZone for Armv8-A in billions of devices the past ten years. The objective of TrustZone for Armv8-M is to open the door for all developers to create such embedded and secure solutions by creating a developer-friendly processing execution environment.

 Arm TrustZone system security diagram

How TrustZone for Armv8-M creates hardware-enforced security for embedded applications

For more information about TrustZone for Armv8-M, please visit the TrustZone page in the Arm community, in which you can join for free to interact with leading developers of tools, silicon, and solutions. Ask questions and see the list of many resources relating to the embedded security: whitepapers, blogs, webinars, etc. In this blog, you will find a comprehensive set of documents regarding the operation and design of systems with TrustZone for Armv8-M. For training, view our technical courses.

If you are creating embedded solutions with NXP microcontrollers, then I highly recommend watching the webinar and downloading the whitepaper for more information.

Thank you to the hundreds of developers who joined Donnie and I and left such positive feedback.

View the recording

Get the whitepaper

Anonymous
  • RachelB
    Offline RachelB over 5 years ago

    :-)

    • Cancel
    • Up 0 Down
    • Reply
    • More
    • Cancel
Architectures and Processors blog
  • How Arm is making it easier to build platforms that support Confidential Computing

    Mark Knight
    Mark Knight
    With new open-source patches for the Realm Management Extension (RME) now available, this blog explores latest developments and techniques for confidential computing on Arm.
    • April 28, 2023
  • Apache Arrow optimization on Arm

    Yibo Cai
    Yibo Cai
    This blog introduces Arm optimization practices with two solid examples from Apache Arrow project.
    • February 23, 2023
  • Optimizing TIFF image processing using AARCH64 (64-bit) Neon

    Ramin Zaghi
    Ramin Zaghi
    This guest blog shows how 64-bit Neon technology can be used to improve performance in image processing applications.
    • October 13, 2022