• Regarding ARMv8M processor Cortex-M23

    Hello,

    I am looking for a development board and software development kit with ARMv8M processors Cortex-M23.

    I need to prototype trusted applications in c/c++ programming language for my research work.

     I am expecting availability of development libraries along…

  • Is the Corelink SSE-200 Subsystem available for Cortex M23?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

     
  • Can you explain why you propose having two cores in your CoreLink SSE-200?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • How did you measure the Instruction cache efficiency? Just code execution from Flash? Reading data from Flash? Programming data to Flash?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Can secure accesses access both secure and nonsecure address map, whereas, nonsecure only access nonsecure part of the address map.

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • What sort of visibility does a non-secure debugger have of the secure sections?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • At what point in time is the boot security map fixed into the chip?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Does a library exist for Python to use the secure features of ARMv8-M or can they only be accessed using ASM or C/C++?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Is it possible to set a memory region from non-secure to secure at runtime?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Will a BLXNS into a location which is marked as secure, end up in the non-secure state, or will there be an exception?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • With regard to slide 38 that talks about calling from secure code to non-secure code, can we assume that the registers pushed {r4-r11} cannot be viewed by examining the stack?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Is the IDAU also run-time programmable?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • What is NSC?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Does Cortex-M33 support TCMs?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • What does Keil offer that GCC does not?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Could you give some tips on developing for ARMv8-M with IAR tools?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • I didn't understand the difference between SAU and IDAU. Can you elaborate on it?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post