02.12.2012 Views

ARM Security Technology Building a Secure System using ...

ARM Security Technology Building a Secure System using ...

ARM Security Technology Building a Secure System using ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Preface<br />

About this document<br />

Intended audience<br />

This document provides an overview of the <strong>ARM</strong> TrustZone technology and how this<br />

can provide a practical level of security through careful <strong>System</strong>-on-a-Chip (SoC)<br />

configuration and software design.<br />

<strong>ARM</strong> TrustZone technology includes the <strong>ARM</strong> <strong>Security</strong> Extensions to the processor,<br />

the security signals added to the AMBA ® 3 bus infrastructure, and a number of pieces of<br />

peripheral Intellectual Property (IP) which can be used to build security on top of the<br />

processor architecture and system architecture.<br />

Caution<br />

This document does not provide a full specification of any of the technology involved.<br />

See the appropriate Technical Reference Manuals.<br />

This whitepaper is suitable for all developers who are making use of the <strong>ARM</strong><br />

TrustZone technology, whether they are writing security requirements, designing a<br />

SoC, developing software, or auditing a design for security.<br />

This document assumes that you are familiar with the <strong>ARM</strong> processor architecture and<br />

common hardware and software terminology.<br />

viii Copyright © 2005-2009 <strong>ARM</strong> Limited. All rights reserved. PRD29-GENC-009492C<br />

Non-Confidential Unrestricted Access

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!