13.01.2017 Views

Executing code in the TrustZone land

2016_SH_Edgar_Barbosa_Running_Code_in_the_TrustZone_Land

2016_SH_Edgar_Barbosa_Running_Code_in_the_TrustZone_Land

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Cha<strong>in</strong> of Trust ﴾CoT﴿ ‐ Boot ﴾1/2﴿<br />

<strong>TrustZone</strong> <strong>code</strong> <strong>in</strong>tegrity is protected by secure boot which is<br />

based on a Cha<strong>in</strong> of Trust ﴾similar to TPM chipsets﴿:<br />

1. After reset <strong>the</strong> device starts execut<strong>in</strong>g <strong>the</strong> PBL ﴾Primary Boot<br />

Loader﴿<br />

2. The PBL is stored <strong>in</strong> read‐only‐memory ﴾ROM﴿ ‐ it is <strong>the</strong> <strong>in</strong>itial<br />

po<strong>in</strong>t <strong>in</strong> <strong>the</strong> cha<strong>in</strong> ‐ it is a trusted <strong>code</strong>.<br />

3. Now each step of <strong>the</strong> boot process will load and au<strong>the</strong>nticate<br />

<strong>the</strong> next step module/<strong>code</strong> before execut<strong>in</strong>g it!

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!