TrustZone for Armv8-M
Course Objectives
This course
provides information on how to design a secure IoT device using different Arm
technologies including an Armv8-M processor with built-in security
partitioning, TrustZone Cryptocell IP and techniques for developing software
that is able to hide assets from attackers.
The training also covers how operating systems like RTX and mbedOS have been extended to provide a secure element capable of storing keys securely and executing crypto functions.
Workbooks are used to give trainees some practical experience on how to create secure and non-secure applications mapped appropriately to secure and non-secure memories, using secure APIs and TrustZone-aware compiler toolchain.
The training also covers how operating systems like RTX and mbedOS have been extended to provide a secure element capable of storing keys securely and executing crypto functions.
Workbooks are used to give trainees some practical experience on how to create secure and non-secure applications mapped appropriately to secure and non-secure memories, using secure APIs and TrustZone-aware compiler toolchain.
General Information
Prerequisites
- Knowledge of existing M-profile devices
- Knowledge of programming in C
- Experience of programming in assembler is useful but not essential
- Some knowledge of embedded systems
Duration & Attendance
2 days (3 with hands-on labs)
Target Audience
Hardware, software and security system architects who need to understand the issues in developing trusted systems using Armv8-M TrustZone
Additional Information
Teaching Methods & Tools
- Arm official course book
- Arm official Workbook
Evaluation & Certification
At
the end of the course the participant will receive a certificate from ARM.