We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

TrustZone is not enough

Formal Metadata

Title
TrustZone is not enough
Subtitle
Hijacking debug components for embedded security
Title of Series
Number of Parts
166
Author
License
CC Attribution 4.0 International:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
This talk deals with embedded systems security and ARM processors architecture. Most of us know that we can perform security with the ARM TrustZone framework. I will show that most ARM processors include debug components (aka CoreSight components) that can be used to create efficient security mechanisms.
Keywords