Develop Software for the Cortex-M Security Extensions Using Arm DS and Arm GNU Toolchain
This post describes the steps to create a basic TrustZone example for the Armv8-M processor with Security Extension by using Arm DS and Arm GNU toolchain. It is assumed that you have a basic knowledge of the Armv8-M Security Extension and embedded-M software programming.
The Secure and Non-secure images make function calls across security boundary based on Armv8-M Security Extension. The steps to create a basic TrustZone example for the Armv8-M processor using Arm DS and Arm GNU toolchain are as follows:
- Configure system and memory.
- Create and build Secure project in Arm DS.
- Create and build Non-secure project in Arm DS.
- Run Secure and Non-secure images in Arm DS with FVP.
To read the full article, click here
Related Semiconductor IP
- Flexible Pixel Processor Video IP
- 1.6T/3.2T Multi-Channel MACsec Engine with TDM Interface (MACsec-IP-364)
- 100G MAC and PCS core
- xSPI + eMMC Combo PHY IP
- NavIC LDPC Decoder
Related Blogs
- Synopsys and Arm Collaboration - Accelerating Development and Innovation for Arm-based Automotive Systems
- Easing software development for high-performance zonal controller based on Arm Cortex-R82AE
- ETAS and Rambus Offer Integrated Software and Hardware Security Solution for Automotive Silicon Designs
- New Armv9 CPUs for Accelerating AI on Mobile and Beyond
Latest Blogs
- Morgan State University (MSU) Leveraging Intel 16 and the Cadence Tool Flow for Academic Chip Tapeout
- Securing the Future of Terabit Ethernet: Introducing the Rambus Multi-Channel Engine MACsec-IP-364 (+363)
- Why Weebit’s IP Licensing Model Matters
- Arasan’s xSPI/eMMC5.1 PHY: Unified Dual-Mode Physical Layer IP
- Evolution of CXL PBR Switch in the CXL Fabric