02.12.2012 Views

ARM Security Technology Building a Secure System using ...

ARM Security Technology Building a Secure System using ...

ARM Security Technology Building a Secure System using ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>ARM</strong> <strong>Security</strong> <strong>Technology</strong><br />

<strong>Building</strong> a <strong>Secure</strong> <strong>System</strong> <strong>using</strong> TrustZone <strong>Technology</strong><br />

Copyright © 2005-2009 <strong>ARM</strong> Limited. All rights reserved.<br />

Release Information<br />

The following changes have been made to this document.<br />

Date Issue Change<br />

December 2008 A First release<br />

January 2009 B Minor language clarifications<br />

Fixed monitor latency calculation onpage 5-12<br />

April 2009 C Added information related to multiprocessor systems:<br />

Accelerator Coherency Port on page 3-10<br />

Multiprocessor systems with the <strong>Security</strong> Extensions on page 3-13<br />

Multiprocessor debug control on page 3-18<br />

<strong>Secure</strong> software and multiprocessor systems on page 5-13<br />

Hardware design checklist on page 7-3<br />

Software design checklist on page 7-5<br />

Proprietary Notice<br />

Words and logos marked with or are registered trademarks or trademarks owned by <strong>ARM</strong> Limited, except<br />

as otherwise stated below in this proprietary notice. Other brands and names mentioned herein may be the<br />

trademarks of their respective owners.<br />

Neither the whole nor any part of the information contained in, or the product described in, this document<br />

may be adapted or reproduced in any material form except with the prior written permission of the copyright<br />

holder.<br />

The product described in this document is subject to continuous developments and improvements. All<br />

particulars of the product and its use contained in this document are given by <strong>ARM</strong> in good faith. However,<br />

all warranties implied or expressed, including but not limited to implied warranties of merchantability, or<br />

fitness for purpose, are excluded.<br />

This document is intended only to assist the reader in the use of the product. <strong>ARM</strong> Limited shall not be liable<br />

for any loss or damage arising from the use of any information in this document, or any error or omission in<br />

such information, or any incorrect use of the product.<br />

Confidentiality Status<br />

This document is Non-Confidential. The right to use, copy and disclose this document may be subject to<br />

license restrictions in accordance with the terms of the agreement entered into by <strong>ARM</strong> and the party that<br />

<strong>ARM</strong> delivered this document to.<br />

Unrestricted Access is an <strong>ARM</strong> internal classification.<br />

Change History<br />

ii Copyright © 2005-2009 <strong>ARM</strong> Limited. All rights reserved. PRD29-GENC-009492CUnrestricted<br />

Access

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!