• Xen/dom0 on Juno

    Justin
    Justin

    Hey all,

    I have been playing around with Xen and Dom0 on a Juno r0 board. Currently dom0 is failing to initailize USB. This is an issue because the rootfs depends on the usb.

    usb 1-1: new high-speed USB device number 2 using ehci-platform

    usb 1-1: device…

    • Answered
    • over 4 years ago
    • Open Source Software and Platforms
    • Arm Development Platforms forum
  • How to download past ARM's document.

    Yuki.Nishimura
    Yuki.Nishimura

    I want to find and download as follow document.

    > ARM Architecture Reference Manual Security Extensions Supplement

    If you have its location URL, could you please tell me it ?

    Or how can I do above ?

    • Answered
    • over 2 years ago
    • Open Source Software and Platforms
    • Arm Development Platforms forum
  • A couple of use cases for TrustZone for ARMv8-M

    Diya Soubra
    Diya Soubra

    Root of Trust implementation – Connected devices with authentication requirements need a root of trust in the system architecture. This is particularly important for devices that can be updated over the air. In a system with TrustZone technology, code…

    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • Platform security architecture is announced by Arm

    Diya Soubra
    Diya Soubra

    • over 2 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • Given an address, how to check its IDAU Security attribution information?

    Tao Lu
    Tao Lu

    From "ARM v8-M Architecture Reference Manual", about IDAU I see:

    The IDAU can provide the following Security attribution information for an address:
    • Security attribution exempt. This specifies that the address is exempt from security attribution…

    • Answered
    • over 1 year ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • A question about interrupt priority degrade

    Wenchuan2018
    Wenchuan2018

    Hi guys,

    I found in armv8-arch ref manual that when PRIS bit in the AIRCR is set, the priority of non-secure handler is mapped to the bottom of the priority range. So I did an experiment.

    I configured two exceptions, systick and svc. The priority are 2…

    • Answered
    • over 1 year ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • Development platforms, compilers for TrustZone

    Seema
    Seema

    Hello All,

    Requirements:

    1. Write a secure program where some part of the program resides in a secure zone.
    2. Code instrumentation: I would like to instrument the compiled binary that runs on the device 

    I could find some options, however, I cannot differentiate…

    • Answered
    • over 1 year ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • Architecting a more Secure world with isolation and virtualization

    Berenice Mann
    Berenice Mann

    New Secure world architecture in Armv8.4

    Arm TrustZone was introduced to the Arm architecture A-profile in 2003. At the heart of the TrustZone approach is the concept of Secure and Normal worlds that are hardware separated. Secure hardware resources are…

    • over 1 year ago
    • Processors
    • Processors blog
  • The Semantics of Transactions and Weak Memory in x86, Power, Arm, and C++

    Nathan Chong
    Nathan Chong

    This is the second in a two-part post from Arm Principal Researcher Dr Nathan Chong on his joint research with Tyler Sorensen (Imperial College London) and Dr John Wickerson (Research Fellow, Imperial College London), and published as a PLDI 2018 Distinguished…

    • over 1 year ago
    • Arm Research
    • Research Articles
  • Concurrent Programming, Transactions and Weak Memory

    Nathan Chong
    Nathan Chong

    This is the first in a two-part post from Arm Principal Researcher Dr Nathan Chong on his joint research with Tyler Sorensen (Imperial College London) and Dr John Wickerson (Research Fellow, Imperial College London). This research was published as a PLDI…

    • over 1 year ago
    • Arm Research
    • Research Articles
  • Platform Security Architecture - PSA primer

    Rob Coombs
    Rob Coombs

    I have been providing a high level introduction to Platform Security Architecture at the Tech Symposia in USA and Asia over the last couple of weeks. Since interest is high I thought I would share my slides so they can receive a wider audience.

    The architecture…

    • BeyondTrustZone_Taiwan_LR (3).pdf
    • over 2 years ago
    • Internet of Things
    • Videos & Files
  • Introducing 2017’s extensions to the Arm Architecture

    Matthew Gretton-Dann
    Matthew Gretton-Dann

    Introduction

    The Arm Architecture is continually evolving, and this blog gives a high-level overview of some of the changes made in Armv8.4-A*. We develop these changes by listening to the Arm Ecosystem and working with them to provide new functionality…

    • over 2 years ago
    • Processors
    • Processors blog
  • Architecting Secure Automotive Systems

    Berenice Mann
    Berenice Mann

    Security concerns for all connected devices have moved to the top of the agenda for manufacturers, but in the case of automotive, where safety is paramount, and large financial liabilities exist, robust security is imperative. Arm is playing its part…

    • over 2 years ago
    • Processors
    • Processors blog
  • Platform Security Architecture – Scalable Security for the IoT

    Berenice Mann
    Berenice Mann

    Arm releases a white paper on the Platform Security Architecture

    The recent deployment of connected devices, as part of the evolution of the Internet of Things (IoT), has led to a major increase in the number of IoT-based cyber-attacks. These attacks…

    • over 2 years ago
    • Processors
    • Processors blog