Arm Community
Arm Community
  • Site
  • User
  • Site
  • Search
  • User
  • Groups
    • Research Collaboration and Enablement
    • DesignStart
    • Education Hub
    • Innovation
    • Open Source Software and Platforms
  • Forums
    • AI and ML forum
    • Architectures and Processors forum
    • Arm Development Platforms forum
    • Arm Development Studio forum
    • Arm Virtual Hardware forum
    • Automotive forum
    • Compilers and Libraries forum
    • Graphics, Gaming, and VR forum
    • High Performance Computing (HPC) forum
    • Infrastructure Solutions forum
    • Internet of Things (IoT) forum
    • Keil forum
    • Morello Forum
    • Operating Systems forum
    • SoC Design and Simulation forum
    • 中文社区论区
  • Blogs
    • AI and ML blog
    • Announcements
    • Architectures and Processors blog
    • Automotive blog
    • Graphics, Gaming, and VR blog
    • High Performance Computing (HPC) blog
    • Infrastructure Solutions blog
    • Innovation blog
    • Internet of Things (IoT) blog
    • Operating Systems blog
    • Research Articles
    • SoC Design and Simulation blog
    • Tools, Software and IDEs blog
    • 中文社区博客
  • Support
    • Arm Support Services
    • Documentation
    • Downloads
    • Training
    • Arm Approved program
    • Arm Design Reviews
  • Community Help
  • More
  • Cancel
Arm Community blogs
Arm Community blogs
Internet of Things (IoT) blog Security Scenarios Addressed by Arm Cortex-M23 and Cortex-M33
  • Blogs
  • Mentions
  • Sub-Groups
  • Tags
  • Jump...
  • Cancel
More blogs in Arm Community blogs
  • AI and ML blog

  • Announcements

  • Architectures and Processors blog

  • Automotive blog

  • Embedded blog

  • Graphics, Gaming, and VR blog

  • High Performance Computing (HPC) blog

  • Infrastructure Solutions blog

  • Internet of Things (IoT) blog

  • Operating Systems blog

  • SoC Design and Simulation blog

  • Tools, Software and IDEs blog

Tags
Actions
  • RSS
  • More
  • Cancel
Related blog posts
Related forum threads

Security Scenarios Addressed by Arm Cortex-M23 and Cortex-M33

Seqlabs_AR1
Seqlabs_AR1
January 6, 2017
3 minute read time.

2016's DDoS attacks on webcams revealed just how vulnerable IoT devices are to remote attacks. The embedded security community and device makers are well aware of these shortcomings but with cost being a primary driver, security implementation often takes a back seat. This has to change. Inadequate device security has a broad business impact, especially when those devices are connected to a communication network.

These vulnerabilities impact revenue, brand image, customer confidence and retention, and total cost of ownership over the life of the device. CIOs and IT pros have dealt with such issues on the IT side for years. What is new is the scale, complexity and lack of standards in the IoT and embedded device space concerning security, governance and manageability. For these reasons, IoT security must be dealt with differently: it must be approached as a strategy not as a check box.

Arm’s new Cortex-M23 and Cortex-M33 present device makers an opportunity to build products that are secure by design, but also enable implementing a security strategy. The new architecture implements TrustZone for Armv8-M, which provides a secure foundation that can be easily utilized by device makers and application developers. A lot has been written on this blog about the technical abilities of the new processors and the new security extensions. Explore other articles on this site to learn more.

The following are a number of security applications permitted by the new TrustZone extensions that are implemented in Cortex-M23 and Cortex-M33, including:

  • IP protection: Intellectual property related directly to a company’s intrinsic value. It can make or break device makers. The ability to designate secure memory regions can be used to store intellectual property while still allowing non-secure applications to access it via APIs.
  • Secure storage of critical information: Keeping user data, identity information, and security keys separate from the rest of the system ensures confidentiality. This assurance limits liability, media exposure and helps protect brand image and consumer confidence.
  • Root of trust implementation: A root of trust implementation provides a secure foundation for many different applications, such as secure over-the-air (OTA) firmware updates. This basis of trust is also critical to facilitating mutual authentication between devices in a system. Indeed, one of the principle benefits of the two processors is that it ensures system-wide security including external memory and peripherals.
  • Sandboxing of certified software: Software certification is an expensive process. Using certified software for cryptography, for example, allows device makers to enter new markets where these requirements are mandated, such as medical devices, industrial control systems, and security related applications. TrustZone capabilities of Cortex-M23 and Cortex-M33 allow storing such code in secure memory regions, while allowing access to applications via APIs in NSC memory regions.

This Sequitur CoreLockr-TZ Demo effectively demonstrates how TrustZone for Armv8-M helps address security concerns plaguing low power devices. In the video, two different vulnerabilities are introduced to illustrate how devices can recover securely in the event of an attack. One simulates a malware attack and the other a failure of the rich OS. The latter shows the ability to use code in secure memory to monitor status in the non-secure region of the SoC.

Cortex-M23 and Cortex-M33 promote building energy-conscious devices like wearables or battery-operated edge nodes in markets such as smart utilities and smart cities. More importantly, they change security economics by reducing complexity and eliminating additional parts dedicated to performing security functions. SoCs based on the two processors are expected to hit the market in 2017. They are widely supported by a swath of software companies including Sequitur Labs, Express Logic, Green Hills Software, IAR Systems, IBM, Mentor Graphics, Micrium, Real-Time implemented Engineers, Symantec and Trustonic.

Find more resources, information and discussions about security for embedded in the TrustZone for Armv8-M Community.

Anonymous
Internet of Things (IoT) blog
  • Expanded access to Arm Virtual Hardware for the entire IoT ecosystem

    Eric Sondhi
    Eric Sondhi
    Arm Virtual Hardware has transitioned from private to public beta and is now open to anyone with an Arm account to try out and use for commercial purposes. Find out more.
    • May 10, 2023
  • Integrating IoT Edge devices with cloud-native analytics for smarter insights

    Ajeet Singh Raina
    Ajeet Singh Raina
    A step-by-step guide on how to integrate IoT edge devices with cloud-native analytics for smarter insights, using a smart agriculture use case.
    • March 29, 2023
  • A bare-metal programming guide

    Sergey Lyubka
    Sergey Lyubka
    Get started with the Arm bare metal programming with only GCC compiler, text editor, and a datasheet. From blinky to an embedded Web device dashboard.
    • March 15, 2023