This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

ARMv8-M TrustZone: Secure & Non-Secure Modules Implementation

Dear Sir/Mam,

I am new to ARM TrustZone technology. I have started studying ARMv8-M architecture in Cortex M23 and Cortex M33. I have gone through white paper Whitepaper - ARMv8-M Architecture Technical Overview

However I have following queries:

1. How are the secure and non-secure modules implemented in  http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf  page no. 97 ? Is it defined in hardware or in software/firmware in IDE (Keil MDK, DS-5)?

2. If both hardware and software can secure the modules then is it possible that I can secure half modules using hardware and remaining half using software?

3. What are secure API's?

Any insights would be appreciated.

Regards,

Sarang

0