1 / 9

ARM Trustzone

ARM Trustzone. Group 2 Jason Hill Ryan Long Joye Turnage Jonathan Ashworth. What is Trustzone?. Trustzone overview Deals with security features in many digital electronic devices such as: Set-top boxes Next-generation smart phones Payment and network equipment. What is Trustzone?.

hosanna
Download Presentation

ARM Trustzone

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ARM Trustzone Group 2 Jason Hill Ryan Long Joye Turnage Jonathan Ashworth

  2. What is Trustzone? • Trustzone overview • Deals with security features in many digital electronic devices such as: • Set-top boxes • Next-generation smart phones • Payment and network equipment

  3. What is Trustzone? Software application built directly into the hard drive Ensures that security is an intrinsic feature at the heart of any device

  4. How does it work? Memory Management Unit (MMU) & Caches- uses tables to determine which level a particular level of memory exists in • Secure Mode • Non-secure Mode

  5. Modes of operation Secure Mode- ensures that vital information is not intercepted by a third party Non-secure Mode- allows more access to less protected information

  6. Trustzone Block Diagram

  7. Applications • Over-the-Air Reprogramming • SIMLock Security • Terminal Identity • Managing Content • M-Wallet Transactions • Virtual Private Networks

  8. Conclusion Security is clearly a growing concern in many markets. Trustzone uses a hardware-enforced security domain in order to systemize the implementation of secure systems.

  9. Conclusion Trustzone technology will make the development of secure applications easier, ultimately expanding the range of data services available to network administrators.

More Related