Questions tagged [trust-zone]

For question related to implementing and interfacing TrustZone secure and normal world software and the monitor mode that brokers them.

Trustzone is an architecture to allow CPU sharing in cases where a traditional dedicated 'secure CPU' may have been used. This can reduce cost, power and board space.

A TrustZone ARM core has two virtual processors with a bus control 'NS' bit to provide hardware based access control. A TrustZone CPU can switch states between two worlds referred to as 'secure' and 'normal'. The worlds strive to be independent of each other requiring minimal changes to transition from a standalone OS/firmware system.

Memory, peripherals, BUS and CPU are made aware of the world via the 'NS' bit which allows the SOC to provide access control to secrets and code on the system. Master devices such as DMA, or multi-core devices can also be TrustZone aware or the bus master can be set to provide boot time locked access.

TrustZone solutions need several components,

  1. A TrustZone CPU
  2. A secure boot mechanism
  3. Bus control
  4. Secure world software

Reference:

97 questions
0
votes
1 answer

Hardware backed keystorage in Android

When searching through sites/blogs and articles about secure key storage on Android, I've found that hardware key storage isn't explained consistent. In the sense that some say that the keys are stored at the Trusted Execution Environment (TEE),…
gillesC
  • 677
  • 1
  • 5
  • 23
0
votes
1 answer

How to access a physical address which is larger than 4G in Trusted firmware provided by Linaro in juno board

I am using Trusted Firmware Image(LSK and Android filesystem) provided by Linaro on Juno board r1. In my case, I just want to some trivial test in EL3, e.g., reading specific memory. To make things easier, I didn't do anything until the system is…
0
votes
1 answer

TrustZone Memory Partitioning

I am reading about ARM Trustzone at this link. I understand that using TrustZone, one can partition the memory into secure and non-secure regions. Vendors may use this to run a secure OS. What I am curious about is that what is the granularity…
Jake
  • 16,329
  • 50
  • 126
  • 202
0
votes
1 answer

How to configure when compiling Uboot?

I followed the intructions in This project and got stuck in the compilation of Uboot. I have completely no idea how to make the following configurations # add CONFIG_RSA, CONFIG_FIT_SIGNATURE, CONFIG_CMD_EXT2 # change the environment config…
Tgn Yang
  • 330
  • 3
  • 16
0
votes
0 answers

Load two kernel images using U-Boot

How can I load two kernel images in the RAM of my board (i.MX 53 QSB) using U-Boot ? (The first image will run in the secure world of the Trustzone and the second one in the normal world.) I read in a thesis that we can use this method : Using an…
EngineerN
  • 133
  • 2
  • 11
0
votes
0 answers

ARM-based commodity hardware without TrustZone?

Do you know embedded or mobile commodity hardware that integrate ARM-based processors and which does not support ARM's TrustZone? Do I have to assume that any commodity device (e.g. OMAP platform) which integrates a TrustZone-ready processor…
Richard Laurant
  • 647
  • 1
  • 8
  • 21
0
votes
1 answer

Direct Memory Access with JTAG in Trust Zone

I'd like to know what prevents me from accessing memory in a DMA fashion, in the Trust Zone, when using JTAG? Thanks in advance.
AK87
  • 613
  • 6
  • 24
1 2 3 4 5 6
7