You copied the Doc URL to your clipboard.

Using this document

This document is organized into the following chapters:

Chapter 1 Introduction

Background material on the embedded security ecosystem, a discussion on who might attack a device, and what form the attack may take.

Chapter 2 System Security

An overview of some of the existing security technologies that are deployed into embedded devices, including some of their strengths and weaknesses. This chapter also outlines the design philosophy of the ARM TrustZone technology, and how it encompasses the strengths of many of the alternative solutions.

Chapter 3 TrustZone Hardware Architecture

A detailed description of the ARM TrustZone technology, and how it impacts the fundamental system components.

This chapter is split into three parts: the first looks at the impact of TrustZone technology on the system infrastructure, the second looks at the impact of the technology to the ARM processor core, and the last part looks at the changes to the debug architecture.

Chapter 4 TrustZone Hardware Library

An overview of the TrustZone-aware peripheral IP that is available from ARM.

This section also includes some design suggestions which enable limited integration of existing IP based on AMBA2 AHB™ interfaces within a system design.

Chapter 5 TrustZone Software Architecture

An introduction to some of the possible software design choices when using an ARM processor implementing the ARM Security Extensions.

Chapter 6 TrustZone System Design

An example system design using Digital Rights Management and Mobile Payment as example use cases.

Chapter 7 Design Checklists

Use the checklists in this chapter for prompts when designing or reviewing a system using TrustZone technology.

Was this page helpful? Yes No