• Non-Secure Software installing SG instructions into Secure Memory
    In " System Design with ARMv8M , Section 1.6 Block-based Gate", a Block-based gate is described. The document describes 2 hard requirements for a Block-base Gate followed by an explanation for the 2nd...
  • ARM TrustZone's Secure/Normal world vs x86's Ring0/3 or OS's kernel/user mode?
    I read document like this TrustZone Security Whitepaper . It describes that all resources like CPU, memory and others are divided by Secure World and Normal World . Programs in Normal World can not access...
  • How NS bit is set in case of DMA transfer ?
    Hi, When core makes a transaction, NS signal is sent on AXI bus depending on the SCR.NS bit. But when DMA transaction is issued, how the NS bit is propagated on the AXI bus ? Thanks Sahil
  • In processors supporting TrustZone, how is secure memory access protected from a non- secure world application accessing it?
    For example, we define a region to be secure. If a non secure app is trying to acess that region, what protection mechanism exists in hardware which will prevent that?
  • Can the linux  boot up without arm-trusted-firmware if the trustzone is not necessary ?
    Hi experts,      I am trying to boot the linux by my bootloader which is running on EL3 level.(switch to EL1 when I jump to the kernel)      The trustzone is not necessay for me, so I don't want to use...