ARM Security Technology Building a Secure System using ...
ARM Security Technology Building a Secure System using ...
ARM Security Technology Building a Secure System using ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Preface<br />
About this document<br />
Intended audience<br />
This document provides an overview of the <strong>ARM</strong> TrustZone technology and how this<br />
can provide a practical level of security through careful <strong>System</strong>-on-a-Chip (SoC)<br />
configuration and software design.<br />
<strong>ARM</strong> TrustZone technology includes the <strong>ARM</strong> <strong>Security</strong> Extensions to the processor,<br />
the security signals added to the AMBA ® 3 bus infrastructure, and a number of pieces of<br />
peripheral Intellectual Property (IP) which can be used to build security on top of the<br />
processor architecture and system architecture.<br />
Caution<br />
This document does not provide a full specification of any of the technology involved.<br />
See the appropriate Technical Reference Manuals.<br />
This whitepaper is suitable for all developers who are making use of the <strong>ARM</strong><br />
TrustZone technology, whether they are writing security requirements, designing a<br />
SoC, developing software, or auditing a design for security.<br />
This document assumes that you are familiar with the <strong>ARM</strong> processor architecture and<br />
common hardware and software terminology.<br />
viii Copyright © 2005-2009 <strong>ARM</strong> Limited. All rights reserved. PRD29-GENC-009492C<br />
Non-Confidential Unrestricted Access