ARM Security Technology Building a Secure System using ...
ARM Security Technology Building a Secure System using ...
ARM Security Technology Building a Secure System using ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 4 TrustZone Hardware Library<br />
4.1 <strong>System</strong> IP ................................................................................................... 4-2<br />
4.2 Processor IP ............................................................................................... 4-8<br />
4.3 Reuse of AMBA2 AHB IP ......................................................................... 4-11<br />
Chapter 5 TrustZone Software Architecture<br />
5.1 Software overview ...................................................................................... 5-2<br />
5.2 Booting a secure system ............................................................................ 5-5<br />
5.3 Monitor mode software ............................................................................... 5-9<br />
5.4 <strong>Secure</strong> software and multiprocessor systems .......................................... 5-13<br />
5.5 The TrustZone API ................................................................................... 5-16<br />
Chapter 6 TrustZone <strong>System</strong> Design<br />
6.1 Gadget2008 product design brief ............................................................... 6-2<br />
6.2 Example use cases .................................................................................... 6-3<br />
6.3 Gadget2008 specification ........................................................................... 6-9<br />
Chapter 7 Design Checklists<br />
7.1 Use case checklist ...................................................................................... 7-2<br />
7.2 Hardware design checklist .......................................................................... 7-3<br />
7.3 Software design checklist ........................................................................... 7-5<br />
vi Copyright © 2005-2009 <strong>ARM</strong> Limited. All rights reserved. PRD29-GENC-009492CUnrestricted<br />
Access