Arm Community
Site
Search
User
Site
Search
User
Support forums
Arm Development Studio forum
Design security model using ARM11 trust zone
Jump...
Cancel
Locked
Locked
Replies
5 replies
Subscribers
119 subscribers
Views
4632 views
Users
0 members are here
Options
Share
More actions
Cancel
Related
How was your experience today?
This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion
Design security model using ARM11 trust zone
Yusnani Yussoff
over 12 years ago
Note: This was originally posted on 19th January 2010 at
http://forums.arm.com
Hi all,
I am a very new user on the ARM11 trustzone.
My fist concern is - how should I start in designing the security model utilizing the trustzone?
I've decided to use RTOS in my development, is there any step by step procedure. ( integrate the os image with the interupt handler and secure monitor software).
Hope some one can guide me.
Thank you
Parents
Peter Harris
over 12 years ago
Note: This was originally posted on 19th January 2010 at
http://forums.arm.com
I'd suggest starting with this document:
[url="
http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/index.html
"]
http://infocenter.arm.com/help/topic/com.a...492c/index.html[/url]
It's a pretty good introduction to the TrustZone hardware architecture and some of the possible software architectures which you might want to use. It's fairly low level - the higher level security model depends on what you are actually trying to secure against what ...
Cancel
Vote up
0
Vote down
Cancel
Reply
Peter Harris
over 12 years ago
Note: This was originally posted on 19th January 2010 at
http://forums.arm.com
I'd suggest starting with this document:
[url="
http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/index.html
"]
http://infocenter.arm.com/help/topic/com.a...492c/index.html[/url]
It's a pretty good introduction to the TrustZone hardware architecture and some of the possible software architectures which you might want to use. It's fairly low level - the higher level security model depends on what you are actually trying to secure against what ...
Cancel
Vote up
0
Vote down
Cancel
Children
No data