Develop Software for the Cortex-M Security Extensions Using Arm DS and Arm GNU Toolchain
This post describes the steps to create a basic TrustZone example for the Armv8-M processor with Security Extension by using Arm DS and Arm GNU toolchain. It is assumed that you have a basic knowledge of the Armv8-M Security Extension and embedded-M software programming.
The Secure and Non-secure images make function calls across security boundary based on Armv8-M Security Extension. The steps to create a basic TrustZone example for the Armv8-M processor using Arm DS and Arm GNU toolchain are as follows:
- Configure system and memory.
- Create and build Secure project in Arm DS.
- Create and build Non-secure project in Arm DS.
- Run Secure and Non-secure images in Arm DS with FVP.
To read the full article, click here
Related Semiconductor IP
- Band-Gap Voltage Reference with dual 2µA Current Source - X-FAB XT018
- 250nA-88μA Current Reference - X-FAB XT018-0.18μm BCD-on-SOI CMOS
- UCIe D2D Adapter & PHY Integrated IP
- Low Dropout (LDO) Regulator
- 16-Bit xSPI PSRAM PHY
Related Blogs
- Introducing CoreCollective for the next era of open collaboration for the Arm software ecosystem
- Deep Robotics and Arm Power the Future of Autonomous Mobility
- Comcores: The One-Stop Shop for Automotive Ethernet and Security
- Rivian’s autonomy breakthrough built with Arm: the compute foundation for the rise of physical AI
Latest Blogs
- AI in Design Verification: Where It Works and Where It Doesn’t
- PCIe 7.0 fundamentals: Baseline ordering rules
- Ensuring reliability in Advanced IC design
- A Closer Look at proteanTecs Health and Performance Management Solutions Portfolio
- Enabling Memory Choice for Modern AI Systems: Tenstorrent and Rambus Deliver Flexible, Power-Efficient Solutions