You copied the Doc URL to your clipboard.

Chapter 5. TrustZone Software Architecture

This chapter looks at some of the possible software architectures that make use of the ARM Security Extensions.

This chapter includes the following sections:

Was this page helpful? Yes No