Arm Community
Site
Search
User
Site
Search
User
Groups
Education Hub
Arm Ambassadors
Open Source Software and Platforms
Research Collaboration and Enablement
Forums
AI and ML forum
Architectures and Processors forum
Arm Development Platforms forum
Arm Development Studio forum
Arm Virtual Hardware forum
Automotive forum
Compilers and Libraries forum
Graphics, Gaming, and VR forum
High Performance Computing (HPC) forum
Infrastructure Solutions forum
Internet of Things (IoT) forum
Keil forum
Morello forum
Operating Systems forum
SoC Design and Simulation forum
SystemReady Forum
Blogs
AI and ML blog
Announcements
Architectures and Processors blog
Automotive blog
Graphics, Gaming, and VR blog
High Performance Computing (HPC) blog
Infrastructure Solutions blog
Internet of Things (IoT) blog
Operating Systems blog
SoC Design and Simulation blog
Tools, Software and IDEs blog
Support
Arm Support Services
Documentation
Downloads
Training
Arm Approved program
Arm Design Reviews
Community Help
More
Cancel
Support forums
Arm Development Studio forum
Qualcomm S4 Snapdragon 8XXX series
Jump...
Cancel
Locked
Locked
Replies
3 replies
Subscribers
122 subscribers
Views
6988 views
Users
0 members are here
Android
Security IP
TrustZone
Options
Share
More actions
Cancel
Related
How was your experience today?
This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion
Qualcomm S4 Snapdragon 8XXX series
ontrack hack
over 11 years ago
Note: This was originally posted on 14th February 2013 at
http://forums.arm.com
Hi all,
first time here. I was curious if anyone had any idea if anyone had any information on what kind of TrustZone Qualcomm 8xxx series chipset are employing? isnt' trustzone ARM specific and even though they have their own KRAIT AP processor it is still based on ARM. so, does that mean the trustzone architecture mentioned below would apply?
http://infocenter.ar..._whitepaper.pdf
it just seems like TZ security extension are a combination of SW and HW that allow partitioning of secure/non secure components (memory/peripherals)
there seem to be TZ images that a loaded from EMMC and subsequent TZ APIs that allow normal world (HLOS) to interact with the secure world in a secure manner via SCM.
I am not sure where TPM and TEE come into play. is TEE achieved in the chipset itself thus it being a secure environment as opposed to TPM? also I am not sure what they mean when they talk about TPM interface 2.0 ?
also i wanted to ask about TZ kernel security. so in the case of HLOS kernel like android for example is that what is being parsed into secure and non secure as i thought all kernel level operations are privileged?
as you can tell i am pretty wet behind the ears on this and would like some direction and guidance in perhaps understanding the general idea of trustzone.
thanks,
DJ
Parents
Varshpee
over 7 years ago
in reply to
Jiawen Zhang
No..its not mobicore
qsee is secure os for qcom
Cancel
Up
0
Down
Cancel
Reply
Varshpee
over 7 years ago
in reply to
Jiawen Zhang
No..its not mobicore
qsee is secure os for qcom
Cancel
Up
0
Down
Cancel
Children
No data