• What sort of visibility does a non-secure debugger have of the secure sections?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • At what point in time is the boot security map fixed into the chip?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Does a library exist for Python to use the secure features of ARMv8-M or can they only be accessed using ASM or C/C++?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Is it possible to set a memory region from non-secure to secure at runtime?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Will a BLXNS into a location which is marked as secure, end up in the non-secure state, or will there be an exception?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • With regard to slide 38 that talks about calling from secure code to non-secure code, can we assume that the registers pushed {r4-r11} cannot be viewed by examining the stack?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Is the IDAU also run-time programmable?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • What is NSC?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • What does Keil offer that GCC does not?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Could you give some tips on developing for ARMv8-M with IAR tools?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • I didn't understand the difference between SAU and IDAU. Can you elaborate on it?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post