02.12.2012 Views

ARM Security Technology Building a Secure System using ...

ARM Security Technology Building a Secure System using ...

ARM Security Technology Building a Secure System using ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4 TrustZone Hardware Library<br />

4.1 <strong>System</strong> IP ................................................................................................... 4-2<br />

4.2 Processor IP ............................................................................................... 4-8<br />

4.3 Reuse of AMBA2 AHB IP ......................................................................... 4-11<br />

Chapter 5 TrustZone Software Architecture<br />

5.1 Software overview ...................................................................................... 5-2<br />

5.2 Booting a secure system ............................................................................ 5-5<br />

5.3 Monitor mode software ............................................................................... 5-9<br />

5.4 <strong>Secure</strong> software and multiprocessor systems .......................................... 5-13<br />

5.5 The TrustZone API ................................................................................... 5-16<br />

Chapter 6 TrustZone <strong>System</strong> Design<br />

6.1 Gadget2008 product design brief ............................................................... 6-2<br />

6.2 Example use cases .................................................................................... 6-3<br />

6.3 Gadget2008 specification ........................................................................... 6-9<br />

Chapter 7 Design Checklists<br />

7.1 Use case checklist ...................................................................................... 7-2<br />

7.2 Hardware design checklist .......................................................................... 7-3<br />

7.3 Software design checklist ........................................................................... 7-5<br />

vi Copyright © 2005-2009 <strong>ARM</strong> Limited. All rights reserved. PRD29-GENC-009492CUnrestricted<br />

Access

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!