Browse By Tags

  • Could you give some tips on developing for ARMv8-M with IAR tools?

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post

  • What is TrustZone for ARMv8-M?

    As a product manager for the Cortex-M33, I see this question pop up a lot. Below is my version of the answer.

    Characteristics of TrustZone technology

    • TrustZone is the security foundation for billions of ARM Cortex-A processor-based systems
    • TrustZone…
  • Which of the Cortex-M processors support TrustZone for ARMv8-M today?

    Another question that I see come up once in a while.

     

    Both the Cortex-M33 and the Cortex-M23 support TrustZone for ARMv8-M.

    Cortex-M23 is the smallest lowest power TrustZone Cortex processor from ARM.

    Cortex-M33 is a general purpose TrustZone processor…

  • What is the top level difference in features between Cortex-M23 and Cortex-M33?

    Both processors have TrustZone for ARMv8-M. The following table compares the other top level features.

     

     

    *Performance numbers are preliminary

  • A couple of use cases for TrustZone for ARMv8-M

    Root of Trust implementation – Connected devices with authentication requirements need a root of trust in the system architecture. This is particularly important for devices that can be updated over the air. In a system with TrustZone technology, code…

  • Link to download gcc support for TrustZone for ARMv8-M

    * All GCC 6 features, plus latest mainline features:
      + Full ARMv8-M support including atomics and Security Extensions
      + ARM PURECODE support for ARMv7-M and ARMv8-M Mainline
      + Co-processor intrinsics support
      + Cortex-M23 and Cortex-M33 support
      + -mthumb…
  • What is the top level difference in features between Cortex-M33 and Cortex-M4?

    This is a very common question.

    The diagram below is a pictorial description of the differences followed by some explanations.

    Cortex-M33 v Cortex-M4 features

    Starting from the bottom:

    • Cortex-M33 is an implementation of the ARMv8-M architecture. Full details are in my blog on the 5…
  • What is the top level difference in features between Cortex-M23 and Cortex-M0+?

    This is a very common question too.

    The diagram is a pictorial description of the differences followed by some explanations.

     

     

    Starting from the bottom:

     

    -Cortex-M23 is an implementation of the ARMv8-M architecture. Full details here.

    -Using the same debug…

  • Technical Reference Manual for Cortex-M33 is released to the web

    For those looking for more technical information for the Cortex-M33 the TRM is now posted in info center

     

    http://infocenter.arm.com/help/topic/com.arm.doc.100230_0002_00_en/cortex_m33_trm_100230_0002_00_en.pdf

     

    The Cortex-M23 TRM was posted a while b…

  • [Cortex-M33 FVP]:SecureFault with SAU disable

    Hello,

    I am using Cortex-M33 FVP model to run the Keil RTX TrustZoneV8M RTOS example.
    Have also tried to experiment with the memory map configuration and the corresponding SAU region programming for NS/S patitioning and the behaviour is as expected.

    However…

  • Cortex-M23 FVP hard faults when using DS-5 Debugger

    Hi,

    I'm starting to explore this technology by running the TrustZone example application in Linux using GNU ARM Toolchain. This example is provided by a CMSIS software pack containing this example called "TrustZone for ARMv8-M No RTOS" which I was…

  • Where will the various software components reside in a TrustZone for ARMv8-M solution?

    Where the system designer wants them to be, of course!

    There is no restriction on where the various software modules reside. As with all other Cortex-M processors, the system designer is at liberty to build the solution that has the best fit for the target…

  • TrustZone of the Cortex-M vs. TrustZone of the Cortex-A

    What is the difference between the TrustZone of Cortex M23/33 and the TrustZone of Cortex A?
    Can you provide documentation on this topic? May I start to prototype my Cortex M23 application on a Cortex A processor and then migrate to Cortex M23 when chips…

  • Why should we call secure function in handler mode?

    Why should we call secure function in handler mode? What is the design purpose for this?  As we know, none-secure side can also call secure function in thread mode.

  • How to use FreeRTOS Scheduler with trustZone ARMV8-M M33 ?

    I have a set of tasks in FreeRTOS and I need to put some of them in the secure world (Trustzone).

    Is there a communication to be established between the SMC trustZone side and the scheduler FreeRTOS side ?

    tracks please.

  • RTOS Design Considerations Version 2.0 - SVCall behavior question

    Hi,

    In RTOS Design Considerations Version 2.0 document, Section 2.2 ("SVCall and PendSV exceptions") following is mentioned.

    When the processor is in Secure state, the SVC exception handling sequence fetches the exception vector from the Secure…

  • Extend the ARM Cortex-M33 with a custom co-processor

    two cores.png

    IoT refers to thousands of diverse market segments that are now using connected intelligent devices: from IoT nodes with rich user interfaces, to tiny sensors that are powered only by energy that is harvested from the environment. These small IoT nodes…

  • Five key features of the Arm Cortex-M33 Processor

    System-on-chip (SoC) solutions based on Arm Cortex processors address diverse embedded market segments, including: Internet of Things, motor control, healthcare, automotive, home automation, and many more, as you can see in this blog by Thomas Ensergueix…

  • Cortex-M23 and Cortex-M33 - Security foundation for billions of devices

    October 19, 2004 was a date like any other, and will probably not mean much to most people. However, if you are part of the Embedded community, that precise date was transformational for the microcontroller (MCU) industry. It was the day that ARM announced…

  • New AMBA Specification Extends Security to Embedded Design: AMBA 5 AHB5

    The amount of data we generate is growing exponentially. Gartner has predicted that in 2015 the global mobile data traffic will be a total of 52 billion terabytes, an increase of 59 percent on 2014. It’s a staggering number that is driven not just by…

  • Whitepaper - ARMv8-M Architecture Technical Overview

    The next generation of ARM Cortex-M processors will be powered by a new architecture version called ARMv8-M architecture. This document provides a technical overview of various enhancements in the new architecture, as well as an introduction to the security…