TrustZone for Armv8-M Secure System Design

  • Delivery method: Face-to-face (Private)

  • Location: Any location

  • Course Length: 2 days

  • Technology Focus: Combined Hardware and Software

  • Cost: Contact us for pricing

  • Related products: M-profile, ARMv8-M, TrustZone

  • Provider: ARM

Enquire Now

Summary

This course provides information on how to design a secure IoT device using different Arm technologies including an Armv8-M processor with built-in security partitioning, TrustZone Cryptocell IP and techniques for developing software that is able to hide assets from attackers. The training also covers how operating systems like RTX and mbedOS have been extended to provide a secure element capable of storing keys securely and executing crypto functions. Workbooks are used to give trainees some practical experience on how to create secure and non-secure applications mapped appropriately to secure and non-secure memories, using secure APIs and TrustZone-aware compiler toolchain.

Prerequisites:

  • Knowledge of existing M-profile devices
  • Knowledge of programming in C
  • Experience of assembler programming is not required but would be beneficial
  • Knowledge of embedded systems

Audience:

  • Hardware and software system architects
  • System security architects
  • Embedded software developers

Delivery method:

Face to face

Length:

2 days

Modules:

  • Introduction to Security
  • Armv8-M Overview
  • Introduction to the Armv8-M Security Extension
  • TrustZone for Armv8-M System IP Overview
  • Toolchain Support for the Armv8-M Security Extension
  • Armv8-M Security Extension Workbook (Sessions 1-3)
  • Exception Handling for the Armv8-M Security Extension
  • Security Attribution
  • Armv8-M Security Extension Workbook (Session 4)
  • TrustZone for Armv8-M Secure System Design
  • TrustZone for Armv8-M Secure System Design Workbook