• Cortex-M23/M33 dynamic power

    ahming
    ahming

    I am doing a survey of the Cortex-M processors, and came across the M23/M33, which are described as having very low power like the M0. Are there some actual numbers (for example, with the smallest configuration, with TrustZone, in 28HPM or 40LP)? Or,…

    • Answered
    • over 1 year ago
    • Processors
    • Cortex-M / M-Profile forum
  • Could you give some tips on developing for ARMv8-M with IAR tools?

    Ed Player
    Ed Player

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post. 

    • Answered
    • over 3 years ago
    • System
    • SoC Design forum
  • What is TrustZone for ARMv8-M?

    Diya Soubra
    Diya Soubra

    As a product manager for the Cortex-M33, I see this question pop up a lot. Below is my version of the answer.

    Characteristics of TrustZone technology

    • TrustZone is the security foundation for billions of ARM Cortex-A processor-based systems
    • TrustZone…
    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • Which of the Cortex-M processors support TrustZone for ARMv8-M today?

    Diya Soubra
    Diya Soubra

    Another question that I see come up once in a while.

     

    Both the Cortex-M33 and the Cortex-M23 support TrustZone for ARMv8-M.

    Cortex-M23 is the smallest lowest power TrustZone Cortex processor from ARM.

    Cortex-M33 is a general purpose TrustZone processor…

    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • What is the top level difference in features between Cortex-M23 and Cortex-M33?

    Diya Soubra
    Diya Soubra

    Both processors have TrustZone for ARMv8-M. The following table compares the other top level features.

     

     

    *Performance numbers are preliminary

    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • A couple of use cases for TrustZone for ARMv8-M

    Diya Soubra
    Diya Soubra

    Root of Trust implementation – Connected devices with authentication requirements need a root of trust in the system architecture. This is particularly important for devices that can be updated over the air. In a system with TrustZone technology, code…

    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • Link to download gcc support for TrustZone for ARMv8-M

    Diya Soubra
    Diya Soubra
    * All GCC 6 features, plus latest mainline features:
      + Full ARMv8-M support including atomics and Security Extensions
      + ARM PURECODE support for ARMv7-M and ARMv8-M Mainline
      + Co-processor intrinsics support
      + Cortex-M23 and Cortex-M33 support
      + -mthumb…
    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • What is the top level difference in features between Cortex-M33 and Cortex-M4?

    Diya Soubra
    Diya Soubra

    This is a very common question.

    The diagram below is a pictorial description of the differences followed by some explanations.

    Cortex-M33 v Cortex-M4 features

    Starting from the bottom:

    • Cortex-M33 is an implementation of the ARMv8-M architecture. Full details are in my blog on the 5…
    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • What is the top level difference in features between Cortex-M23 and Cortex-M0+?

    Diya Soubra
    Diya Soubra

    This is a very common question too.

    The diagram is a pictorial description of the differences followed by some explanations.

     

     

    Starting from the bottom:

     

    -Cortex-M23 is an implementation of the ARMv8-M architecture. Full details here.

    -Using the same debug…

    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • Technical Reference Manual for Cortex-M33 is released to the web

    Diya Soubra
    Diya Soubra

    For those looking for more technical information for the Cortex-M33 the TRM is now posted in info center

     

    http://infocenter.arm.com/help/topic/com.arm.doc.100230_0002_00_en/cortex_m33_trm_100230_0002_00_en.pdf

     

    The Cortex-M23 TRM was posted a while b…

    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • [Cortex-M33 FVP]:SecureFault with SAU disable

    sdiwakar
    sdiwakar

    Hello,

    I am using Cortex-M33 FVP model to run the Keil RTX TrustZoneV8M RTOS example.
    Have also tried to experiment with the memory map configuration and the corresponding SAU region programming for NS/S patitioning and the behaviour is as expected.

    However…

    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • Cortex-M23 FVP hard faults when using DS-5 Debugger

    HugoARA
    HugoARA

    Hi,

    I'm starting to explore this technology by running the TrustZone example application in Linux using GNU ARM Toolchain. This example is provided by a CMSIS software pack containing this example called "TrustZone for ARMv8-M No RTOS" which I was…

    • over 2 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • Where will the various software components reside in a TrustZone for ARMv8-M solution?

    Diya Soubra
    Diya Soubra

    Where the system designer wants them to be, of course!

    There is no restriction on where the various software modules reside. As with all other Cortex-M processors, the system designer is at liberty to build the solution that has the best fit for the target…

    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • TrustZone of the Cortex-M vs. TrustZone of the Cortex-A

    StefanH
    StefanH

    What is the difference between the TrustZone of Cortex M23/33 and the TrustZone of Cortex A?
    Can you provide documentation on this topic? May I start to prototype my Cortex M23 application on a Cortex A processor and then migrate to Cortex M23 when chips…

    • Answered
    • over 2 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • Why should we call secure function in handler mode?

    matt-ma
    matt-ma

    Why should we call secure function in handler mode? What is the design purpose for this?  As we know, none-secure side can also call secure function in thread mode.

    • Answered
    • over 1 year ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • How to use FreeRTOS Scheduler with trustZone ARMV8-M M33 ?

    Simon
    Simon

    I have a set of tasks in FreeRTOS and I need to put some of them in the secure world (Trustzone).

    Is there a communication to be established between the SMC trustZone side and the scheduler FreeRTOS side ?

    tracks please.

    • Answered
    • over 1 year ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • RTOS Design Considerations Version 2.0 - SVCall behavior question

    Rajiv
    Rajiv

    Hi,

    In RTOS Design Considerations Version 2.0 document, Section 2.2 ("SVCall and PendSV exceptions") following is mentioned.

    When the processor is in Secure state, the SVC exception handling sequence fetches the exception vector from the Secure…

    • Answered
    • over 1 year ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M forum
  • NXP enhances embedded security and signal processing with new Arm Cortex-M33 based chip families

    Kobus Marneweck
    Kobus Marneweck

    There is no doubt that the next generation of The Internet of Things devices market has exploded, and with that comes the need for the next generation of microcontrollers to support enhanced security, as well as more processing power, while further decreasing…

    • over 1 year ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M blog
  • Announcing DS-5 v5.28

    Elan Tanzer
    Elan Tanzer

    Arm’s Development Solutions Group is pleased to announce the release of a new version of DS-5. Building upon our legacy of early support for Arm IP, DS-5.28 includes new features and configurations to make your debug sessions easier and more productive…

    • over 2 years ago
    • Software Tools
    • Tools, Software and IDEs blog
  • What is eXecute-Only-Memory (XOM)?

    Joseph Yiu
    Joseph Yiu

    An introduction to eXecute-only-Memory

    eXecute-Only-Memory (XOM) is a firmware protection technique to help prevent 3rd parties from stealing or reverse engineering firmware, and at the same time allowing 3rd parties to add additional software to the…

    • over 2 years ago
    • Processors
    • Processors blog
  • Extend the ARM Cortex-M33 with a custom co-processor

    Diya Soubra
    Diya Soubra

    two cores.png

    IoT refers to thousands of diverse market segments that are now using connected intelligent devices: from IoT nodes with rich user interfaces, to tiny sensors that are powered only by energy that is harvested from the environment. These small IoT nodes…

    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M blog
  • Five key features of the Arm Cortex-M33 Processor

    Diya Soubra
    Diya Soubra

    System-on-chip (SoC) solutions based on Arm Cortex processors address diverse embedded market segments, including: Internet of Things, motor control, healthcare, automotive, home automation, and many more, as you can see in this blog by Thomas Ensergueix…

    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M blog
  • Cortex-M23 and Cortex-M33 - Security foundation for billions of devices

    Thomas Ensergueix
    Thomas Ensergueix

    October 19, 2004 was a date like any other, and will probably not mean much to most people. However, if you are part of the Embedded community, that precise date was transformational for the microcontroller (MCU) industry. It was the day that ARM announced…

    • over 3 years ago
    • TrustZone for Armv8-M
    • TrustZone for Armv8-M blog
  • ARMv8-M architecture lays foundation for secure embedded solutions

    Diya Soubra
    Diya Soubra

    Advances in processor architecture and connectivity technology have pushed embedded solutions into an increasing set of applications as demonstrated by ARM® partners shipping over 4 billion devices into that market in 2014.  The availability of an increasing…

    • over 4 years ago
    • System
    • Embedded blog
  • New AMBA Specification Extends Security to Embedded Design: AMBA 5 AHB5

    Eoin McCann
    Eoin McCann

    The amount of data we generate is growing exponentially. Gartner has predicted that in 2015 the global mobile data traffic will be a total of 52 billion terabytes, an increase of 59 percent on 2014. It’s a staggering number that is driven not just by…

    • over 4 years ago
    • Processors
    • Processors blog
>