• rd/wr Speculation on TZC400 controller

    Hi,

    I'm looking at TZC400 datasheet and it shows that the controller enables fastpath using read speculations. However, you can disable/enable both the read and write speculation in the speculation control register mentioned in datasheet. How does the…

  • What sort of visibility does a non-secure debugger have of the secure sections?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • At what point in time is the boot security map fixed into the chip?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Does a library exist for Python to use the secure features of ARMv8-M or can they only be accessed using ASM or C/C++?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Is it possible to set a memory region from non-secure to secure at runtime?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Will a BLXNS into a location which is marked as secure, end up in the non-secure state, or will there be an exception?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • With regard to slide 38 that talks about calling from secure code to non-secure code, can we assume that the registers pushed {r4-r11} cannot be viewed by examining the stack?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Is the IDAU also run-time programmable?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • What is NSC?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • What does Keil offer that GCC does not?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Could you give some tips on developing for ARMv8-M with IAR tools?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • I didn't understand the difference between SAU and IDAU. Can you elaborate on it?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • Interrupt driven TrustZone application

    Hello,

    I would like to know if a Trustzone application can be interrupt driven instead of being triggered by the non-secured world (scm).

    Thanks,

    Fabrice.

  • What flow should I execute to make cache and MMU work properly when I turn into non secure world?

    In A7 platform with TZ extension , I know that there is a virtual MMU for non secure world, and I think it should be enabled after entering non secure world.

    But the most confusing thing is that what has to be done with cache-----clean , invalidate or…