• rd/wr Speculation on TZC400 controller

    SaeedM
    SaeedM

    Hi,

    I'm looking at TZC400 datasheet and it shows that the controller enables fastpath using read speculations. However, you can disable/enable both the read and write speculation in the speculation control register mentioned in datasheet. How does the…

    • over 2 years ago
    • System
    • Embedded forum
  • What sort of visibility does a non-secure debugger have of the secure sections?

    Ed Player
    Ed Player

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post. 

    • Answered
    • over 3 years ago
    • System
    • SoC Design forum
  • At what point in time is the boot security map fixed into the chip?

    Ed Player
    Ed Player

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post. 

    • Answered
    • over 3 years ago
    • System
    • SoC Design forum
  • Does a library exist for Python to use the secure features of ARMv8-M or can they only be accessed using ASM or C/C++?

    Ed Player
    Ed Player

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post. 

    • Answered
    • over 3 years ago
    • System
    • SoC Design forum
  • Is it possible to set a memory region from non-secure to secure at runtime?

    Ed Player
    Ed Player

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post. 

    • Answered
    • over 3 years ago
    • System
    • SoC Design forum
  • Will a BLXNS into a location which is marked as secure, end up in the non-secure state, or will there be an exception?

    Ed Player
    Ed Player

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post. 

    • Answered
    • over 3 years ago
    • System
    • SoC Design forum
  • With regard to slide 38 that talks about calling from secure code to non-secure code, can we assume that the registers pushed {r4-r11} cannot be viewed by examining the stack?

    Ed Player
    Ed Player

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post. 

    • Answered
    • over 3 years ago
    • System
    • SoC Design forum
  • Is the IDAU also run-time programmable?

    Ed Player
    Ed Player

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post. 

    • Answered
    • over 3 years ago
    • System
    • SoC Design forum
  • What is NSC?

    Ed Player
    Ed Player

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post. 

    • Answered
    • over 3 years ago
    • System
    • SoC Design forum
  • What does Keil offer that GCC does not?

    Ed Player
    Ed Player

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post. 

    • Answered
    • over 3 years ago
    • System
    • SoC Design forum
  • Could you give some tips on developing for ARMv8-M with IAR tools?

    Ed Player
    Ed Player

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post. 

    • Answered
    • over 3 years ago
    • System
    • SoC Design forum
  • I didn't understand the difference between SAU and IDAU. Can you elaborate on it?

    Ed Player
    Ed Player

    This question was raised in the 'How to implement a secure IoT system on ARMv8-M' webinar, view all the questions in the round up blog post. 

    • Answered
    • over 3 years ago
    • System
    • SoC Design forum
  • White Paper: Hardware Features for Maintaining Security During Operation

    Nicole_Curtiss-Wright
    Nicole_Curtiss-Wright

    In our previous Trusted Computing white paper, we discussed the importance of secure boot for Trusted Computing. After secure boot is implemented, our focus turns to hardware features built-in to the most popular defense and aerospace processor architectures…

    • over 1 year ago
    • System
    • Embedded blog
  • Interrupt driven TrustZone application

    Motorolasolutions
    Motorolasolutions

    Hello,

    I would like to know if a Trustzone application can be interrupt driven instead of being triggered by the non-secured world (scm).

    Thanks,

    Fabrice.

    • Answered
    • over 4 years ago
    • System
    • Embedded forum
  • What flow should I execute to make cache and MMU work properly when I turn into non secure world?

    Jay Zhao
    Jay Zhao

    In A7 platform with TZ extension , I know that there is a virtual MMU for non secure world, and I think it should be enabled after entering non secure world.

    But the most confusing thing is that what has to be done with cache-----clean , invalidate or…

    • over 5 years ago
    • System
    • SoC Design forum
  • Arm CryptoCell-312: Simplifying the design of secure IoT systems

    Jim Wallace
    Jim Wallace

    Connected devices have become a vital part of our lives, impacting everything from our homes to our offices and factories, even improving our health and fitness. However, these IoT devices have also become an increasingly attractive target for cyber…

    • over 3 years ago
    • System
    • Embedded blog
  • ARM TrustZone CryptoCell - A Comprehensive Security Solution

    Stephanie Usher
    Stephanie Usher
    Security Graphic-01-NoText.jpg

    If you are interested in learning more about security and ARM TrustZone CryptoCell technologies, check out our recent webinar Watch now: How to protect your systems with ARM TrustZone CryptoCell.

    Connected devices have become a vital part of our lives…

    • over 3 years ago
    • System
    • Embedded blog
  • ARMv8-M architecture lays foundation for secure embedded solutions

    Diya Soubra
    Diya Soubra

    Advances in processor architecture and connectivity technology have pushed embedded solutions into an increasing set of applications as demonstrated by ARM® partners shipping over 4 billion devices into that market in 2014.  The availability of an increasing…

    • over 4 years ago
    • System
    • Embedded blog
  • ARM technology driving the wearable trend

    Jim Wallace
    Jim Wallace

    Wearable technology is the most talked about next-generation trend, predicted to hugely disrupt the consumer electronics landscape - and ARM is right at the centre of its emergence and growth.

    Today, the wearable market includes a variety of products…

    • over 6 years ago
    • System
    • Embedded blog
  • View related content from anywhere
  • More
  • Cancel