Arm Community
Arm Community
  • Site
  • User
  • Site
  • Search
  • User
Arm Community blogs
Arm Community blogs
Embedded and Microcontrollers blog White Paper: Hardware Features for Maintaining Security During Operation
  • Blogs
  • Mentions
  • Sub-Groups
  • Tags
  • Jump...
  • Cancel
More blogs in Arm Community blogs
  • AI blog

  • Announcements

  • Architectures and Processors blog

  • Automotive blog

  • Embedded and Microcontrollers blog

  • Internet of Things (IoT) blog

  • Laptops and Desktops blog

  • Mobile, Graphics, and Gaming blog

  • Operating Systems blog

  • Servers and Cloud Computing blog

  • SoC Design and Simulation blog

  • Tools, Software and IDEs blog

Tags
  • White Paper
  • virtualization
  • Curtiss-Wright Defense Solutions
  • TrustZone
  • NXP
Actions
  • RSS
  • More
  • Cancel
Related blog posts
Related forum threads

White Paper: Hardware Features for Maintaining Security During Operation

Nicole_Curtiss-Wright
Nicole_Curtiss-Wright
November 16, 2018

In our previous Trusted Computing white paper, we discussed the importance of secure boot for Trusted Computing. After secure boot is implemented, our focus turns to hardware features built-in to the most popular defense and aerospace processor architectures to ensure the continued security of a trusted system during operation.

Hardware features

Understanding these features, what they protect against, and how to effectively use them will enable embedded systems to operate securely even in the face of attacks. In most cases, some software has to be modified as well in order to take advantage of these hardware features. In a future white paper, we will discuss the software aspect of maintaining system security during operation.

Because different processor architectures support different security features, this white paper considers some examples of those features. It’s important though to review your own specific platform’s architecture to determine which features are available and germane to your system’s unique requirements. Generally, the system integrator will want to use all of the security features that are available. Variables, such as cost, complexity, and the system’s security requirements and threat assessment, can influence the decision about which features will actually be implemented. Each individual program will have to review their program requirements and make the appropriate tradeoff decision regarding security and cost, schedule, complexity. Discussions with commercial-off-the-shelf (COTS) hardware vendors at the earliest stages of system development can be of great help in making the right choices.

Download the white paper

Download the 'Hardware Features for Maintaining Security During Operation' white paper to learn more about:

  • Arm TrustZone
  • NXP QorIQ Trust Architecture
  • Intel SGX and OS Guard

Download white paper

Anonymous
Embedded and Microcontrollers blog
  • Formally verifying a floating-point division routine with Gappa – part 2

    Simon Tatham
    Simon Tatham
    A method of testing whether a numerical error analysis using Gappa really matches the code it is intended to describe.
    • September 4, 2025
  • Formally verifying a floating-point division routine with Gappa – part 1

    Simon Tatham
    Simon Tatham
    Learn the basics of using Gappa for numerical error analysis, using floating-point division in Arm machine code as a case study.
    • September 4, 2025
  • Adapting Kubernetes for high-performance IoT Edge deployments

    Alexandre Peixoto Ferreira
    Alexandre Peixoto Ferreira
    In this blog post, we address heterogeneity in IoT edge deployments using Kubernetes.
    • August 21, 2024