ARM TrustZone and Secure Operating Systems

  • Chapter
  • First Online:
Embedded and Real-Time Operating Systems
  • 762 Accesses

Abstract

This chapter covers ARM TrustZone technology and secure operating systems. It first describes the ARM TrustZone technology as a security extension in ARMv7 and its evolution to ARMv8 for security computing. It explains both hardware and software architectures to meet the needs for security. It describes the secure world and normal world, interactions, and switching between the two worlds. It explains the fundamental problem in secure systems, from booting time to establishing a chain of trusts in both hardware and software. It points out example systems based on TrustZone and research activities in this area. In line with this book’s presentation style, it uses example programs to show the implementation of a secure world and a normal world. The secure world comprises a secure monitor at EL3, which provides service functions at secure EL1. The normal world comprise processes at non-secure EL1, which use SMC to access service functions in the secure world, and switching between the two different worlds.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 96.29
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 126.59
Price includes VAT (France)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Building a Secure System using TrustZone Technology, ARM 2009

    Google Scholar 

  2. Security in ARMv8 Systems, ARM Developer 2022

    Google Scholar 

  3. TrustZone Explained: Architectural Features and Use Cases. B. Ngabonziza, D. Martin, A. Bailey, H. Cho and S. Martin, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing

    Google Scholar 

  4. Demistifying Arm TrustZone: A Comprehensive Survey, S. Pinto, N. Santos, ACM Computing Surveys, Vol. 51, No. 6, 2019

    Google Scholar 

  5. ARM Cortex-A Series Version: 1.0, Programmer’s Guide for ARMv8-A, ARM 2015

    Google Scholar 

  6. Arm Architecture Reference Manual Supplement Armv9, for Armv9-A architecture profile, ARM 2021

    Google Scholar 

  7. Realm Management Extension Version 1.0, ARM 2021

    Google Scholar 

  8. TrustZone technology for Armv8-M Architecture Version 2.1, ARM, 2018

    Google Scholar 

  9. Platform Security Boot Guide, ARM, 2020

    Google Scholar 

  10. ARM Trusted Firmware User Guide, https://review.trustedfirmware.org, 2022

  11. ARM Trusted Firmware Design, https://chromium.googlesource.com, 2022

  12. Research on ARM TrustZone, W. Li, Y. **a, H. Chen, Mobile Computing and Communications, Vol 22, 2018

    Google Scholar 

  13. RusTEE: Develo** Memory-Safe ARM TrustZone Applications, S. Wan, et al, ACSAC ’20, ACM 2020

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Wang, K.C. (2023). ARM TrustZone and Secure Operating Systems. In: Embedded and Real-Time Operating Systems. Springer, Cham. https://doi.org/10.1007/978-3-031-28701-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28701-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28700-8

  • Online ISBN: 978-3-031-28701-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation