Executing code in the TrustZone land
2016_SH_Edgar_Barbosa_Running_Code_in_the_TrustZone_Land
2016_SH_Edgar_Barbosa_Running_Code_in_the_TrustZone_Land
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Cha<strong>in</strong> of Trust ﴾CoT﴿ ‐ Boot ﴾1/2﴿<br />
<strong>TrustZone</strong> <strong>code</strong> <strong>in</strong>tegrity is protected by secure boot which is<br />
based on a Cha<strong>in</strong> of Trust ﴾similar to TPM chipsets﴿:<br />
1. After reset <strong>the</strong> device starts execut<strong>in</strong>g <strong>the</strong> PBL ﴾Primary Boot<br />
Loader﴿<br />
2. The PBL is stored <strong>in</strong> read‐only‐memory ﴾ROM﴿ ‐ it is <strong>the</strong> <strong>in</strong>itial<br />
po<strong>in</strong>t <strong>in</strong> <strong>the</strong> cha<strong>in</strong> ‐ it is a trusted <strong>code</strong>.<br />
3. Now each step of <strong>the</strong> boot process will load and au<strong>the</strong>nticate<br />
<strong>the</strong> next step module/<strong>code</strong> before execut<strong>in</strong>g it!