Abstract
This chapter covers ARM TrustZone technology and secure operating systems. It first describes the ARM TrustZone technology as a security extension in ARMv7 and its evolution to ARMv8 for security computing. It explains both hardware and software architectures to meet the needs for security. It describes the secure world and normal world, interactions, and switching between the two worlds. It explains the fundamental problem in secure systems, from booting time to establishing a chain of trusts in both hardware and software. It points out example systems based on TrustZone and research activities in this area. In line with this book’s presentation style, it uses example programs to show the implementation of a secure world and a normal world. The secure world comprises a secure monitor at EL3, which provides service functions at secure EL1. The normal world comprise processes at non-secure EL1, which use SMC to access service functions in the secure world, and switching between the two different worlds.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Building a Secure System using TrustZone Technology, ARM 2009
Security in ARMv8 Systems, ARM Developer 2022
TrustZone Explained: Architectural Features and Use Cases. B. Ngabonziza, D. Martin, A. Bailey, H. Cho and S. Martin, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing
Demistifying Arm TrustZone: A Comprehensive Survey, S. Pinto, N. Santos, ACM Computing Surveys, Vol. 51, No. 6, 2019
ARM Cortex-A Series Version: 1.0, Programmer’s Guide for ARMv8-A, ARM 2015
Arm Architecture Reference Manual Supplement Armv9, for Armv9-A architecture profile, ARM 2021
Realm Management Extension Version 1.0, ARM 2021
TrustZone technology for Armv8-M Architecture Version 2.1, ARM, 2018
Platform Security Boot Guide, ARM, 2020
ARM Trusted Firmware User Guide, https://review.trustedfirmware.org, 2022
ARM Trusted Firmware Design, https://chromium.googlesource.com, 2022
Research on ARM TrustZone, W. Li, Y. **a, H. Chen, Mobile Computing and Communications, Vol 22, 2018
RusTEE: Develo** Memory-Safe ARM TrustZone Applications, S. Wan, et al, ACSAC ’20, ACM 2020
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Wang, K.C. (2023). ARM TrustZone and Secure Operating Systems. In: Embedded and Real-Time Operating Systems. Springer, Cham. https://doi.org/10.1007/978-3-031-28701-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-031-28701-5_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28700-8
Online ISBN: 978-3-031-28701-5
eBook Packages: Computer ScienceComputer Science (R0)