go-kite.....Additionally, same url:
TrustZone: Integrated Hardware and Software Security. Enabling Trusted Computing in Embedded Systems - Volume 3, Number 4, 2004
Author:
Tiago Alves & Don Felton, ARM
Synopsis:
The rising interest in solutions for trusted computing is largely driven by the potentially severe economic consequences of failing to ensure security in embedded applications.
Ensuring security in both wired and mobile applications has become imperative. Making an embedded product safe from
malicious attacks has consequences for hardware and software design, as well as the physical attributes of the design. It is now accepted that the best protected embedded systems must have security measures designed-in from the outset, starting with the specification for the processor or CPU core.
ARM is enabling system security by integrating protective measures into the heart of its cores and providing secure software to complement the efforts of semiconductor manufacturers, product OEMs and operating system partners. For OEM partners, the issue of platform integrity has become paramount. For network operators and content providers, concerns over digital rights management (DRM) and m-commerce are growing.
« Back