Trusted Execution Environments (TEEs) such as Arm TrustZone, while well-intentioned, present challenges for engineers. First, they doesn't allow for partitioning between many sensitive functions within a secure domain, and, perhaps more importantly, they can be very difficult to use. Don Barnetson of Hex-Five discusses TEEs and multi-zone security, a new technology for the RISC-V ISA that enables limitless partitions, each with its own set of resources. And, it has minimal impact on existing development processes and tools.
Previous White Paper
A desire in the development community to use Linux is often at odds with the security requirements of an or...
We also recommend:
GUI toolkit for Linux enhances 32-bit microprocessor capabilities for low- and mid-range- resolution graphical displays.
Learn how to bake cybersecurity into can’t-fail edge devices in this educational video series with Wind River. The seven-part series compresses the entire security lifecycle into less than 30 minutes.
Deciding what hardware to use for your embedded GUI application? From understanding performance and storage requirements to estimating memory needs, you’ll be faced with quite a few important...
Initial netlists in a formal verification process must be optimized, so additional logic is needed for Design for Test. Here we offer formal verification flow and debugging techniques for 16 nm node.
Multicore embedded systems are becoming increasingly common. This paper looks at using a hypervisor or multicore framework, or both, to control and mange a multicore system, which is a critical...
There are many things to consider when moving from RTOS to Linux for embedded projects. This white paper provides practical information so developers can be fully aware of the trade-offs and the...
The Past, Present and Future of Cybersecurity in Embedded Systems explores how security requirements have changed from the early days of embedded systems. It examines how vulnerabilities have...
SystemLink helps enable seamless test operations and data management across an entire organization.
ESD Alliance to Lead Joint Effort with Cadence, Mentor, a Siemens Business, and Synopsys to Create Server Certification Protocol
OpenXR is an open, industry standard API that enables the development and deployment of portable, cross-platform AR/VR (XR) runtimes.
You need to be sure that the software you send to the plant is exactly the same as the software that gets installed into the manufactured products. No exceptions.
Why do less than four percent of IoT devices implement the security measures necessary to protect an organization's IP and customers from local or network-borne threats?
In this series of five webcasts, we’ll run through the five key security-related problems that will impact your design, and more importantly, how to solve them.
DesignSpark Mechanical features built-in help text, quick-guide tutorials, example designs, and access to a 3D catalog with 3D models from leading component manufacturers.
Spectrum analyzers are used to capture and display wanted and unwanted signals, as well as enable a range of measurements including power, frequency, modulation, and distortion. This paper will...
Secure contexts are a must in industrial platforms, especially if it’s a “connected” platform.
You’ve spent months or even years creating IP that belongs to your company and/or its customers. In many cases, that IP is what makes you stand out from your competitors.
In this week’s Dev Kit Weekly, Perry is going on lock-down the MachX03D Development Board from Lattice Semiconductor.
According to industry analysts, we could see one trillion IoT connections by the year 2035, with the transfer of more than 2 Zbytes of data just from consumer devices alone.
Jumpstarts new-application design for industrial and smart-building markets.