I'd suggest starting with this document:[url="http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/index.html"]infocenter.arm.com/.../url]It's a pretty good introduction to the TrustZone hardware architecture and some of the possible software architectures which you might want to use. It's fairly low level - the higher level security model depends on what you are actually trying to secure against what ...