trust-zone

Which ARM based development boards should I use?

廉价感情. 提交于 2019-12-12 09:39:30
问题 I want to start a project in which I want to do authenticated boot for Android based on ARM's TrustZone technology. Which board should I use? The minimal requirements: ARM V7 instruction set USB, VGA/HDMI connectors touch-screen connectors Flash capabilities 512 MB RAM TrustZone enabled JTAG connector and DB-9 UART port power supply Board should have documentation available Android drivers and codecs as I will run Android on it. So far, I found the Freescale i.MX53, the Pandaboard, the Beagle

ARM trustzone usage

↘锁芯ラ 提交于 2019-12-11 14:19:09
问题 I would like to ask some questions about ARM trustzone. 1.) Can anyone give me the concrete example: when trustzone is needed and how it helps to solve security problems? 2.) I heared that FIQs could be configured as "secure interrupts". Does it mean that my FIQ handlers will be situated in secure world? 3.) When this FIQ secure / non secure configuration is done? I think the answer is somewhere in the GIC registers. Could i read this registers to be sure about secure / non secure FIQ

i.MX53 QSB and ARM TrustZone

人盡茶涼 提交于 2019-12-11 12:33:56
问题 I'm exploring the i.MX53 QSB and the TrustZone extensions. I run an OS in the secure world thanks to the U-Boot bootloader. Now I'm in the secure world. I have three questions : The first question is when should I share the memory and the interrupts between the secure and normal world ? The second one is how can I move to the normal world in order to run a Rich OS on it? The third question concerns the monitor mode code, where should I write it ? Is it a kernel module in the secure world ?

TrustZone: Scheduling processes from the two worlds

故事扮演 提交于 2019-12-11 11:18:28
问题 If I have a single core CPU on a TZ-enabled device and there are two processes running: one in the secure world and one in the non-secure world, is it possible to have the scheduler manage them in an pre-emptive way, such that each process gets assigned a certain time slice? 回答1: Actually, it is possible, but only in a round about way. You can't use a single scheduler to handle the two separate tasks as they execute in completely separate execution environments. What you can do though is use

arm trustzone monitor mode switch design

独自空忆成欢 提交于 2019-12-11 07:23:00
问题 the basic world switch flow is: set FIQ to monitor mode normal world -> FIQ triggered -> enter monitor mode (do switch to Secure world, restore Secure world context) -> in Secure world sys mode -> FIQ is not clear, enter FIQ handler in Secure world step3 and step 4, after we restore the target context, arm will trigger the exception to enter the exception is the behavior correct? (if we dont branch to FIQ handle in monitor mode vector table) we need flow like below: (no world context switch

IMX53 external abort

独自空忆成欢 提交于 2019-12-11 06:12:06
问题 I am booting Android on an IMX53 Sabre tablet. The last few lines seen on serial port as android boots up normally is as follows: warning: `rild' uses 32-bit capabilities (legacy support in use) pmem: request for physical address of pmem region from process 2262. request_suspend_state: on (3->0) at 12032459753 (2000-01-03 01:08:28.336600001 U TC) Unhandled fault: external abort on non-linefetch (0x1018) at 0x40a85054 Unhandled fault: external abort on non-linefetch (0x1018) at 0x40a85054 Note

What prevents any malcious software from raising SMC exception in ARM TrustZone?

和自甴很熟 提交于 2019-12-11 04:23:59
问题 I am reading about ARM TrustZone. I read that when the Normal World wants a function from the Secure World, they raise SMC exception which makes a transfer to the Secure World. The thing that I did not understand is what prevents any malicious code from raising the SMC exception? if any unauthorized software can cause a transfer to the Secure World then how is the secure world "secure"? 回答1: Malicious software can transfer control to the secure world but is unable to manipulate the code in

How is an ARM TrustZone secure OS secure?

不问归期 提交于 2019-12-10 17:45:08
问题 I am trying to read the TrustZone white paper but it is really difficult to understand some of the basic stuff. I have some questions about it. They may be simple questions but I am a beginner in this field: What makes secure world really "secure". I mean why normal world might be tampered with but not the secure world? Who can change secure os? I mean like adding a "service"? can for example an application developer for mobile pay application add a service in the Secure OS to work with his

How to Introspect normal world from secure world using TrustZone?

China☆狼群 提交于 2019-12-06 15:35:34
I have learned that secure world can protect critical data from being accessed by normal world, What I don't understand is that how do I measure the integrity of normal world from secure world. I find some relevant work in the Samsung TZ-RKP and SierraTEE , in which they both implement a feature that could measure the integrity of normal world. But they didn't give technical details. I have two questions and I'd appreciate it very much if anyone could give me some clues. Suppose I want to see what processes are running in the normal world, do I have to use a kernel module in the normal world

Which ARM based development boards should I use?

点点圈 提交于 2019-12-05 10:01:53
I want to start a project in which I want to do authenticated boot for Android based on ARM's TrustZone technology . Which board should I use? The minimal requirements: ARM V7 instruction set USB, VGA/HDMI connectors touch-screen connectors Flash capabilities 512 MB RAM TrustZone enabled JTAG connector and DB-9 UART port power supply Board should have documentation available Android drivers and codecs as I will run Android on it. So far, I found the Freescale i.MX53, the Pandaboard, the Beagle board xM (which has TrustZone disabled, apparently), the Atmel-based boards, the Versiatile Express