Develop Software for the Cortex-M Security Extensions Using Arm DS and Arm GNU Toolchain
This post describes the steps to create a basic TrustZone example for the Armv8-M processor with Security Extension by using Arm DS and Arm GNU toolchain. It is assumed that you have a basic knowledge of the Armv8-M Security Extension and embedded-M software programming.
The Secure and Non-secure images make function calls across security boundary based on Armv8-M Security Extension. The steps to create a basic TrustZone example for the Armv8-M processor using Arm DS and Arm GNU toolchain are as follows:
- Configure system and memory.
- Create and build Secure project in Arm DS.
- Create and build Non-secure project in Arm DS.
- Run Secure and Non-secure images in Arm DS with FVP.
To read the full article, click here
Related Semiconductor IP
- Simulation VIP for AMBA CHI-C2C
- Process/Voltage/Temperature Sensor with Self-calibration (Supply voltage 1.2V) - TSMC 3nm N3P
- USB 20Gbps Device Controller
- SM4 Cipher Engine
- Ultra-High-Speed Time-Interleaved 7-bit 64GSPS ADC on 3nm
Related Blogs
- Easing software development for high-performance zonal controller based on Arm Cortex-R82AE
- ETAS and Rambus Offer Integrated Software and Hardware Security Solution for Automotive Silicon Designs
- New Armv9 CPUs for Accelerating AI on Mobile and Beyond
- Deep Robotics and Arm Power the Future of Autonomous Mobility
Latest Blogs
- Accelerate Automotive System Design with Cadence AI-Driven DSPs
- What Makes FPGA Architecture Ideal for Ultra-Low-Latency Systems?
- Introducing agileSecure anti-tamper security portfolio
- Same Chip, Two Destinies: How Power Profiles Improve With On-Chip Monitoring
- A Hybrid Subsystem Architecture to Elevate Edge AI