Arm Community
Site
Search
User
Site
Search
User
Support forums
Arm Development Studio forum
Qualcomm S4 Snapdragon 8XXX series
Locked
Locked
Replies
3 replies
Subscribers
121 subscribers
Views
7132 views
Users
0 members are here
Android
Security IP
TrustZone
Options
Share
More actions
Related
How was your experience today?
This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion
Qualcomm S4 Snapdragon 8XXX series
ontrack hack
over 12 years ago
Note: This was originally posted on 14th February 2013 at
http://forums.arm.com
Hi all,
first time here. I was curious if anyone had any idea if anyone had any information on what kind of TrustZone Qualcomm 8xxx series chipset are employing? isnt' trustzone ARM specific and even though they have their own KRAIT AP processor it is still based on ARM. so, does that mean the trustzone architecture mentioned below would apply?
http://infocenter.ar..._whitepaper.pdf
it just seems like TZ security extension are a combination of SW and HW that allow partitioning of secure/non secure components (memory/peripherals)
there seem to be TZ images that a loaded from EMMC and subsequent TZ APIs that allow normal world (HLOS) to interact with the secure world in a secure manner via SCM.
I am not sure where TPM and TEE come into play. is TEE achieved in the chipset itself thus it being a secure environment as opposed to TPM? also I am not sure what they mean when they talk about TPM interface 2.0 ?
also i wanted to ask about TZ kernel security. so in the case of HLOS kernel like android for example is that what is being parsed into secure and non secure as i thought all kernel level operations are privileged?
as you can tell i am pretty wet behind the ears on this and would like some direction and guidance in perhaps understanding the general idea of trustzone.
thanks,
DJ
0
Quote