Develop Software for the Cortex-M Security Extensions Using Arm DS and Arm GNU Toolchain
This post describes the steps to create a basic TrustZone example for the Armv8-M processor with Security Extension by using Arm DS and Arm GNU toolchain. It is assumed that you have a basic knowledge of the Armv8-M Security Extension and embedded-M software programming.
The Secure and Non-secure images make function calls across security boundary based on Armv8-M Security Extension. The steps to create a basic TrustZone example for the Armv8-M processor using Arm DS and Arm GNU toolchain are as follows:
- Configure system and memory.
- Create and build Secure project in Arm DS.
- Create and build Non-secure project in Arm DS.
- Run Secure and Non-secure images in Arm DS with FVP.
To read the full article, click here
Related Semiconductor IP
- Ultra-Low-Power LPDDR3/LPDDR2/DDR3L Combo Subsystem
- 1G BASE-T Ethernet Verification IP
- Network-on-Chip (NoC)
- Microsecond Channel (MSC/MSC-Plus) Controller
- 12-bit, 400 MSPS SAR ADC - TSMC 12nm FFC
Related Blogs
- Easing software development for high-performance zonal controller based on Arm Cortex-R82AE
- Deep Robotics and Arm Power the Future of Autonomous Mobility
- Comcores: The One-Stop Shop for Automotive Ethernet and Security
- Rivian’s autonomy breakthrough built with Arm: the compute foundation for the rise of physical AI
Latest Blogs
- Rivian’s autonomy breakthrough built with Arm: the compute foundation for the rise of physical AI
- AV1 Image File Format Specification Gets an Upgrade with AVIF v1.2.0
- Industry’s First End-to-End eUSB2V2 Demo for Edge AI and AI PCs at CES
- Integrating Post-Quantum Cryptography (PQC) on Arty-Z7
- UA Link PCS customizations from 800GBASE-R Ethernet PCS Clause 172