Trusted Execution Environments (TEEs) such as Arm TrustZone, while well-intentioned, present challenges for engineers. First, they doesn't allow for partitioning between many sensitive functions within a secure domain, and, perhaps more importantly, they can be very difficult to use. Don Barnetson of Hex-Five discusses TEEs and multi-zone security, a new technology for the RISC-V ISA that enables limitless partitions, each with its own set of resources. And, it has minimal impact on existing development processes and tools.
- Dev Tools & OS
- Machine Learning
- Reference Designs
- System Block Diagrams
- Dev Kit Selector
- White Papers
- Webcasts & Events
- Product Search
- Embedded World
Previous White Paper
Containerized Linux: The Secret to IoT Security
A desire in the development community to use Linux is often at odds with the security requirements of an or...
We also recommend:
Finding Concurrency Errors with GrammaTech Static Analysis
Multithreading adds entirely new classes of potential bugs to those that must be considered by developers.
Making Safety-Critical Software Development Affordable with Static Analysis
Safety-critical software is becoming exceedingly expensive to develop and manufacturers are looking for solutions that increase developer productivity. Static analysis tools are indispensable for safe
Protecting Against Tainted Data in Embedded Apps with Static Analysis
This paper describes a static analysis technique – taint analysis – that can be used to find how potentially hazardous inputs can flow through a program to reach sensitive parts of code, empowering...
Containerized Linux: The Secret to IoT Security
A desire in the development community to use Linux is often at odds with the security requirements of an organization, leaving a gap between a company’s goals and the skill sets of its engineers.
Spectre, Meltdown, and Tortuga Logic's Hardware Security Verification at Arm TechCon
The Spectre and Meltdown vulnerabilties resulted from speculative execution, designed to satisfy our need for speed. These could have been prevented through the use of hardware security verification,
So, How Secure are your Coding Practices? Ask AdaCore
Developing secure code is no longer optional, but that doesn't mean it's easy. Some software engineers use vulnerability databases like CWE and OWASP to ensure their code is robust as possible, howeve
IAR Systems leads the way for secure IoT development based on Arm TrustZone and Arm Cortex-M
The leading independent Arm tools provider enables companies to go to market early with robust, secure IoT products
Connect to an Embedded Web Server with Automated Certificate Management
Don't let your users get caught in a security web. Make it easy for them.
Strategies for Deploying Xilinx's Zynq UltraScale+ RFSoC
On February 21st, 2017, Xilinx® announced the introduction of a new technology called RFSoC with the rather dramatic headline “Xilinx Unveils Disruptive Integration and Architectural Breakthrough for
Neural Network Optimization with Sparse Computing and Facebook Glow
There are 27 different types of neural networks. The number of neural network types has increased as engineers and data scientists seek out optimized implementations of AI for use cases.
Riding the Deep Learning Wave: Simulations Enabling Software Engineers to Generate Data Needed to Train Neural Networks
The vision of software solutions evolving from exposure to data has some compelling aspects: training by example offers the possibility of a true mass manufacturing technique for software.
Significance of Certified Ethical Hacker (CEH) Training and Certification
In order to save your company from online hackers, the significance of becoming a Certified Ethical Hacker (CEH) is gaining momentum around the world.
Trends in Embedded: Microchip
Microchip is certainly one of the leaders in the embedded industry. The number of MCUs the company manufactures is staggering by just about any metric.
Software Development Life Cycle Stages When Getting Started on a New Idea
When you work in the software industry, you're likely aware of how open, flexible and innovative the market is.
Simple On-Line Training For Complex Topics
The basics of deep learning and neural nets, as well as Ada and Spark are handled in a refreshing manner.
STMicroelectronics acquires graphical user interface software specialist Draupner Graphics
-Acquisition to extend STM32 ecosystem with TouchGFX highly advanced GUI solution for embedded applications -Will accelerate TouchGFX roadmap and scale distribution to the mass market -TouchGFX...
Embedded tools and services provider Ashling wins approval as NXP engineering consultant
Thanks to 20+ years of partnership with NXP on embedded tools and services activities, Ashling has been approved by NXP as an Advanced Engineering Consultant
Security must remain effective throughout a product’s entire lifetime
The Timesys TRST technology reduces the attack surface of an embedded system.
Free or not free; that is the question
There really are no free development tools. Here’s what you need to consider when choosing development tools for your next project.
AdaCore Technologies for cyber security, part 2: The challenge of secure software