Securing IoT Devices With ARM TrustZone
Warren Kurisu, Mentor Graphics Embedded Systems Division
EETimes (8/15/2014 05:38 PM EDT)
As we observe the world in which we live, and in particular the electronic devices that surround us, we cannot help but be amazed at how quickly technology has evolved and how this pace of evolution continues to accelerate. The functionality of connected devices is rapidly increasing, and, accordingly, the value of the information stored on these devices, or information accessible through these devices is also rapidly rising. Because these value-rich devices are often connected to a network, cybercrime and cyber security concerns are also today’s front page news.
In this discussion I will address securing devices for connected and Internet of Things (IoT) systems. We’ll also look at how virtualization can be leveraged to enable consolidation and reliability of connected devices and at how ARM TrustZone can be utilized to address categories of security threats. Throughout the supply chain spanning semiconductor vendors, software developers, and system integrators, there are three interrelated topics that are consistently discussed: (1) IoT connectivity, (2) a move to ARM-based System on Chip (SoC) architectures, and (3) security.
E-mail This Article | Printer-Friendly Page |
|
Related Articles
New Articles
- What is JESD204C? A quick glance at the standard
- Optimizing Power Efficiency in SOC with PVT Sensor-Assisted DVFS Technology
- Bandgap Reference (BGR) Circuit Design and Transient Analysis in 90nm VLSI Technology
- Quantum Readiness Considerations for Suppliers and Manufacturers
- A Rad Hard ASIC Design Approach: Triple Modular Redundancy (TMR)
Most Popular
- What is JESD204C? A quick glance at the standard
- System Verilog Assertions Simplified
- System Verilog Macro: A Powerful Feature for Design Verification Projects
- Understanding Logic Equivalence Check (LEC) Flow and Its Challenges and Proposed Solution
- Optimizing Analog Layouts: Techniques for Effective Layout Matching