Introduction to Security Design in Embedded Linux Systems

Introduction to Security Design in Embedded Linux Systems

Follow + star our public account, don’t miss the wonderful content Author: HywelStar Recently, while chatting with several friends involved in embedded systems, we discussed system security and found that many projects are still relatively weak in system-level security design. Today, let’s talk about what security hardening can be done at the system level in … Read more

Setting Safety Boundaries for MCUs Using Programming Software

Setting Safety Boundaries for MCUs Using Programming Software

Follow+Star Public Account Number, don’t miss out on exciting content Source | Renesas Embedded Encyclopedia To enhance the security of MCU projects, it is crucial to set safety boundaries. This article discusses the method of setting IDAU safety boundaries using the Renesas RA6M5 (Qiming 6M5 Development Board) and Renesas Flash Programmer programming tool as examples. … Read more

Understanding ARMv8, ARMv9, AArch64, and ARM64 Architectures

Understanding ARMv8, ARMv9, AArch64, and ARM64 Architectures

Consider this: A64 refers to the instruction set architecture, AArch64 is the 64-bit architecture, ARMv8/ARMv9 are also architectures, and TrustZone is a type of security architecture. Confused? What about ARM64? 1. ARMv7/ARMv8/ARMv9 are the true architectures of ARM. The term architecture can be understood as a technical specification, a technical reference, or a design; in … Read more

What is the Meaning and Role of TrustZone in Cortex-M85 (RA8) Microcontroller?

What is the Meaning and Role of TrustZone in Cortex-M85 (RA8) Microcontroller?

Follow+Star Public Account Number, don’t miss out on exciting content Author | strongerHuang WeChat Public Account | strongerHuangTrustZone, translated as: secure zone, trusted zone.TrustZone is a hardware-level security technology introduced by ARM, aimed at providing stronger security protection for embedded systems by isolating sensitive resources from non-secure operations.The latest Arm Cortex-M85 core includes TrustZone functionality, … Read more

What is the Meaning and Role of TrustZone in Cortex-M85 (RA8) Microcontroller?

What is the Meaning and Role of TrustZone in Cortex-M85 (RA8) Microcontroller?

Follow+Star Public Account Number, don’t miss out on exciting content Author | strongerHuang WeChat Public Account | strongerHuangTrustZone, translated as: secure zone, trusted zone.TrustZone is a hardware-level security technology introduced by ARM, aimed at providing stronger security protection for embedded systems by isolating sensitive resources from non-secure operations.The latest Arm Cortex-M85 core includes TrustZone functionality, … Read more

Renesas RA Series MCU Naming Method and Selection

Renesas RA Series MCU Naming Method and Selection

2.2.2 Renesas RA Series MCU Naming Method and Selection 2.2.2.1 Renesas MCU Naming Method Overall Naming: Click to view larger image For beginners, understanding the different numbers and letters in the model numbers of the RA product family can be challenging. We will first take one model from the RA series MCU, R7FA6M5BH2CBG, as an … Read more

Understanding A64, ARMv8, ARMv9, and AArch64 Architectures

Understanding A64, ARMv8, ARMv9, and AArch64 Architectures

Thought: A64 refers to the instruction set architecture, aarch64 is the 64-bit architecture, armv8/armv9 are also architectures, Trustzone is a type of security architecture, they are all architectures, confused? What is arm64? 1. armv7/armv8/armv9 are the real architectures of ARM. The term architecture can be understood as a technical specification, a technical reference, a design, … Read more

Essential Security Technologies in Arm Learning

Essential Security Technologies in Arm Learning

This article comes from the Jishu Community special topic, mainly sharing learning materials related to security technology. This Issue’s Special Recommendations This issue recommends a special topic on security technology, covering learning about the ShanHai security processor from Arm, learning about Arm TrustZone technology (including interrupts), Arm PSA technical materials, privacy computing, information and functional … Read more

Overview and Summary of ARMv8-M TrustZone

Overview and Summary of ARMv8-M TrustZone

01 Introduction First, let’s take a look at a software architecture diagram: 1.1 Introduction to ARMv8-M TrustZone The concept of TrustZone technology is not new. This technology has been used in Arm Cortex-A series processors for many years and has now expanded to cover Armv8-M processors. At a high level, the concept of TrustZone technology … Read more