A Guide to Securing Embedded Devices with TrustZone - Sponsored By Arm

Securing embedded systems has become a critical task for developers as more devices become connected and upgradable over the Internet. In this session, attendees will become familiar with the design methodologies necessary to secure their embedded systems using the new Arm® TrustZone® for Cortex®-M processors. We will examine important concepts, such as Secure and Non-secure domains, setting up a TrustZone RTOS and debugging a secure application.

This interactive session will provide a hands-on demonstration of the newly released Microchip SAM L11, a Cortex-M23 based chip with TrustZone. We will use Arm Keil MDK to demonstrate how to get TrustZone up and running on both hardware, and also in simulation, using a virtual processor.

Topics covered in this session include:

– Introduction to TrustZone

– Defining the Secure and Non-secure world

– Example use cases to secure an application with TrustZone

– Implementing an RTOS in the TrustZone environment

– How to debug a TrustZone-based application

– Best practices for securing an embedded system

– Recommendations for next steps

  • Date:Wednesday, October 17
  • Time:4:30 PM - 5:20 PM
  • Location:Meeting Room 211A/C
  • Session Type:Sponsored Session
  • Room:Meeting Room 211A/C
  • Pass Type:All-Access Pass, Expo Floor Pass
Jacob Beningo
Beningo Embedded Group
Kobus Marneweck