What is the Meaning and Role of TrustZone in Cortex-M85 (RA8) Microcontroller?

What is the Meaning and Role of TrustZone in Cortex-M85 (RA8) Microcontroller?

Follow+Star Public Account Number, don’t miss out on exciting content Author | strongerHuang WeChat Public Account | strongerHuangTrustZone, translated as: secure zone, trusted zone.TrustZone is a hardware-level security technology introduced by ARM, aimed at providing stronger security protection for embedded systems by isolating sensitive resources from non-secure operations.The latest Arm Cortex-M85 core includes TrustZone functionality, … Read more

What is the Meaning and Role of TrustZone in Cortex-M85 (RA8) Microcontroller?

What is the Meaning and Role of TrustZone in Cortex-M85 (RA8) Microcontroller?

Follow+Star Public Account Number, don’t miss out on exciting content Author | strongerHuang WeChat Public Account | strongerHuangTrustZone, translated as: secure zone, trusted zone.TrustZone is a hardware-level security technology introduced by ARM, aimed at providing stronger security protection for embedded systems by isolating sensitive resources from non-secure operations.The latest Arm Cortex-M85 core includes TrustZone functionality, … Read more

Botnets Trigger IoT Security Battle: Discussing Embedded Security

The rise of Internet of Things (IoT) botnets has become a security threat in emerging industries such as smart homes, smart cities, and industrial networking. Distributed Denial of Service (DDoS) attacks from botnets have been around for some time, and IoT botnets are not new either. Botnets and Their Potential Threats A botnet refers to … Read more

Embedded Security Tool: Practical JTAG Debugging

Embedded Security Tool: Practical JTAG Debugging

He is the “Little Horse” mentioned by TK at the GeekPwn conference in 2015, another alchemist who intruded into the security circle (originally a chemistry major) – HyperChem. After a few years of experience in software unpacking, he is currently focusing on embedded security and firmware reverse engineering. This researcher from Tencent Security’s Xuanwu Lab, … Read more

Two New Points in Automation: Changes Brought by IoT (Part One: Embedded Device Security, Old Soldiers with New Stories, Relating to IIoT Security)

Two New Points in Automation: Changes Brought by IoT (Part One: Embedded Device Security, Old Soldiers with New Stories, Relating to IIoT Security)

Introduction Industrial automation consists of two parts: networking and interconnection of devices, and the design and manufacturing of embedded devices. The development of the Internet of Things (IoT) poses challenges to the interconnectivity and information security of factory, industrial facilities, and service equipment. Previously, when devices were not connected to the internet, everything was safe; … Read more