Develop Software for the Cortex-M Security Extensions Using Arm DS and Arm GNU Toolchain
This post describes the steps to create a basic TrustZone example for the Armv8-M processor with Security Extension by using Arm DS and Arm GNU toolchain. It is assumed that you have a basic knowledge of the Armv8-M Security Extension and embedded-M software programming.
The Secure and Non-secure images make function calls across security boundary based on Armv8-M Security Extension. The steps to create a basic TrustZone example for the Armv8-M processor using Arm DS and Arm GNU toolchain are as follows:
- Configure system and memory.
- Create and build Secure project in Arm DS.
- Create and build Non-secure project in Arm DS.
- Run Secure and Non-secure images in Arm DS with FVP.
To read the full article, click here
Related Semiconductor IP
- Root of Trust (RoT)
- Fixed Point Doppler Channel IP core
- Multi-protocol wireless plaform integrating Bluetooth Dual Mode, IEEE 802.15.4 (for Thread, Zigbee and Matter)
- Polyphase Video Scaler
- Compact, low-power, 8bit ADC on GF 22nm FDX
Related Blogs
- The Age of AI Demands Faster Chip Development: Only Arm and Cadence Deliver
- Synopsys and Arm Collaboration - Accelerating Development and Innovation for Arm-based Automotive Systems
- Easing software development for high-performance zonal controller based on Arm Cortex-R82AE
- Reviewing different Neural Network Models for Multi-Agent games on Arm using Unity
Latest Blogs
- Cadence Announces Industry's First Verification IP for Embedded USB2v2 (eUSB2v2)
- The Industry’s First USB4 Device IP Certification Will Speed Innovation and Edge AI Enablement
- Understanding Extended Metadata in CXL 3.1: What It Means for Your Systems
- 2025 Outlook with Mahesh Tirupattur of Analog Bits
- eUSB2 Version 2 with 4.8Gbps and the Use Cases: A Comprehensive Overview