Filtered by:

Clear All
Date and time to be announced
A Developer's Guide to Security on Cortex-M-based MCUs Kobus Marneweck, Arm show more Description Modern embedded processors have a range of different security features, for example, the Arm Cortex-M processor series supports memory protection, TrustZone, and physical protection. Choosing the right security technology can be critical for many applications and this presentation will provide an in-depth explanation of each of these technologies, and the factors that need to be considered when choosing the right security approach. This talk will also cover the other key differences in Cortex-M processors and what software changes developers need to be aware of when migrating projects to the latest Armv8-M processors. Session Type Conference Session Pass Type All-Access Pass Speakers Kobus Marneweck Arm Implementing Digital Filters on Arm Cortex-M Processors Charles Lord, Blue Ridge Advanced Design show more Description The Arm Cortex-M is a popular choice for many sensor and control functions in the Internet of Things, robotics, and other applications. In many cases, we need to do some filtering or signal processing in these implementations, and we may end up coding some digital filtering using the CMSIS-DSP library. But how well do these filters work for many applications? We will build and test some filters for some representative applications and look at the effectiveness of the code in both filter function and code overhead within the main application. Session Type Conference Session Pass Type All-Access Pass Speakers Charles Lord Blue Ridge Advanced Design Optimizing Hardware/Software Development for Arm-based Embedded Designs Bill Neifert, Arm; Frank Schirrmeister, Cadence Design Systems, Inc.; Jason Andrews, Arm show more Description Software is crucial to enable designs for the IoT edge node through hubs to networks and servers, and networks for mobile, server, automotive, and consumer applications. We will introduce and evaluate techniques for mixed-fidelity execution of Arm-based designs, utilizing models at different abstractions – transaction-level (TLM) and register-transfer level (RTL). These models can be used in simulation, emulation, and FPGA-based prototyping and enable embedded software development, early integration of hardware, and software, IP selection, and performance optimization. We will compare different software-enablement techniques for bring up, test and debug and efficient hardware/software analysis. Session Type Conference Session Pass Type All-Access Pass Speakers Bill Neifert Arm Frank Schirrmeister Cadence Design Systems, Inc. Jason Andrews Arm Performance of Quantum-safe Cryptography in Arm Devices Reza Azarderakhsh, PQSecure Technologies, LLC and Florida Atlantic University show more Description Advances in the realization of quantum computers are a real threat to our security and privacy. There is ongoing research on making our computers and connected devices secure against quantum computers called post-quantum cryptography. In this talk, we will explain available solutions and present our research findings on the highly-optimized software libraries for post-quantum cryptography, based on Supersingular Isogeny Key Encapsulation (SIKE) protocol on Armv8 processors. SIKE is one of the candidates submitted for standardization and, due to its smallest key requirements, is more suitable for embedded devices. We demonstrate the performance results in an Arm-based smartphone. Session Type Conference Session Pass Type All-Access Pass Speakers Reza Azarderakhsh PQSecure Technologies, LLC and Florida Atlantic University Running Microcontrollers in the Browser Jan Jongboom, Arm show more Description Embedded development seems stuck in the 1990s. Compiling and flashing a new application can take minutes, stepping through code requires an external debugging probe, and many tools are only available on Windows. What if we would be able to run a Cortex-M microcontroller straight in the browser? Development times would be much faster, simulation would be instant, and debugging would go through the normal browser development tools – all while still writing normal C code. Sounds insane?! The Mbed simulator makes it possible by cross-compiling Mbed OS to WebAssembly, offering peripheral simulation, networking interfaces, and even LPWAN radio support. Session Type Conference Session Pass Type All-Access Pass Speakers Jan Jongboom Arm Using the Arm Cortex-M Memory Protection Unit (MPU) with an RTOS Jean J Labrosse, Silicon Labs show more Description A Memory Protection Unit is hardware that limits the access to memory and peripheral devices to only the code that needs to access those resources. An MPU allows an application developer to create more robust, safe and secure applications. The application can be organized by processes, each having access to its own memory and peripheral space. I will show how an MPU, as found in the Cortex-M (v7M and v8M), can interact with an RTOS and what recourses an RTOS has when a memory or I/O access violation is detected. Session Type Conference Session Pass Type All-Access Pass Speakers Jean J Labrosse Silicon Labs Virtual Reality and Augmented Reality Optimized for Heterogeneous Multicore Systems Lorenzo Dal Col, Virtual Arts show more Description Virtual reality and augmented reality experiences require very high resolution, frame rate, and smoothness, and represent the most demanding applications run on a mobile device today. Modern phones have capable hardware, many times containing eight or more CPU cores and up to 18 GPU cores, but writing code that works well in this environment can be challenging. This presentation will show real-world examples of innovative techniques and tools for writing software which uses all the CPU and GPU cores, while maximizing energy efficiency. Session Type Conference Session Pass Type All-Access Pass Speakers Lorenzo Dal Col Virtual Arts
Close Filters

Session Type


Pass Type

30135 PassType
27253 SecondaryTrack
30821 Date