This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Design security model using ARM11 trust zone

Note: This was originally posted on 19th January 2010 at http://forums.arm.com

Hi all,

I am a very new user on the ARM11 trustzone.
My fist concern is - how should I start in designing the security model utilizing the trustzone?
I've decided to use RTOS in my development, is there any step by step procedure. ( integrate the os image with the interupt handler and secure monitor software).
Hope some one can guide me.
Thank you
Parents
  • Note: This was originally posted on 16th September 2010 at http://forums.arm.com

    Hi All,

    I have to start working on Trust zone. I am able to find the APIs of Trust zone, but can we have Library of it. Can we apply in simple socket client-server programming.

    I have VxWorks rtos, can we use Trust Zone APIs there? Please let me know in brief, let it be very basic although.


    I'd suggest starting with this document:

    [url="http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/index.html"]infocenter.arm.com/.../url]

    It's a pretty good introduction to the TrustZone hardware architecture and some of the possible software architectures which you might want to use. It's fairly low level - the higher level security model depends on what you are actually trying to secure against what ...
Reply
  • Note: This was originally posted on 16th September 2010 at http://forums.arm.com

    Hi All,

    I have to start working on Trust zone. I am able to find the APIs of Trust zone, but can we have Library of it. Can we apply in simple socket client-server programming.

    I have VxWorks rtos, can we use Trust Zone APIs there? Please let me know in brief, let it be very basic although.


    I'd suggest starting with this document:

    [url="http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/index.html"]infocenter.arm.com/.../url]

    It's a pretty good introduction to the TrustZone hardware architecture and some of the possible software architectures which you might want to use. It's fairly low level - the higher level security model depends on what you are actually trying to secure against what ...
Children
No data