SlideShare a Scribd company logo
©ARM 2016
LAS16-203:
Platform Security
Architecture for embedded
devices
Linaro Connect
September 2016
Mark Hambleton
Senior Director
Systems and Software Group
©ARM 20162
Secure systems are being deployed everywhere
 Secure systems can already be found in diverse industries and markets, although no
security implementation can be perfect
 These secure systems provide mechanisms such as authentication, integrity checking,
and confidentiality to protect assets across multiple use-cases
Example market Example use-cases
Mobile Identity, Payments, DRM
IoT Device Management and Identity
Enterprise/Server/Networkin
g
SW attestation and Secure Execution
Automotive Safety Critical systems
©ARM 20163
ARM TrustZone® enables the ecosystem on A-class secure
systems
Global platform
standardization
Initial RoT &
security subsystem
TrustZone-based
TEE
Common foundation
Hardware
Interfaces
Normal world code Trusted software
ARM
Trusted
Firmware
Trusted boot
Payload dispatcherSMCCC PSCI
EL1
EL2
Secure device drivers
Hypervisor
Apps
ARMv8A /
Cortex-A
SoC
subsystem
Graphics
Video
Crypto
Secure
store
Physical IP
Trusted
apps
Payment
DRM
Rich OS
Device drivers
Trusted OS
Here’s a reminder of the architecture
Ecosyste
m
supplied
Trusted
SW/HW
Key
©ARM 20164
TrustZone is defined and supported by existing standards and
reference implementations
Hardware
Interfaces
Normal world code Trusted software
ARM
Trusted
Firmware
Trusted boot
Payload dispatcherSMCCC PSCI
EL1
EL2
Apps
ARMv8A /
Cortex-A
SoC
subsystem
Graphics
Video
Crypto
Secure store
Physical IP
Trusted Board Boot
Requirements (TBBR)
Defines a secure boot process
to be compliant with
GlobalPlatform TEE Protection
Profile 1.2
Trusted Firmware (TF)
Implements a trusted boot
flow Trusted Base System
Architecture (TBSA)
Defines HW requirements for
security functionality for
TrustZone-based systems
©ARM 20165
ARMv8-M brings TrustZone to the microcontroller market
Global platform
standardization
Initial RoT &
security subsystem
TrustZone-based
TEE
Common foundation
Hardware Interfaces
Normal world code Trusted software
ARM
Trusted
Firmware Trusted boot
Payload dispatcherSMCCC PSCI
EL1
EL2
Secure device drivers
Hypervisor
Apps
ARMv8A /
Cortex-A
SoC
subsystem
Graphics
Video
CryptoCell
Secure storage
Physical IP
Trusted apps
Payment
DRM
Rich OS
Device drivers
Trusted OS
ARMv8M /
Cortex-M
Microcontroller
TRNG
Unique ID
CryptoCell
Secure storage
Physical IP
Privileged
Hardware
Interfaces
Normal world code Trusted software
Device drivers
Unprivileged
RTOS scheduler
Platform code
Secure Partitioning
Manager
Trusted
libs
Crypto
Attestation
TrustZone-based
SPM
Comms stack
Apps/user TLS/Crypto libs
Initial RoT &
security subsystem
CMSIS APIs
ARMv8-A ARMv8-M
©ARM 20166
We are defining TBSA for M-profile for SoC designers
 The Trusted Base System Architecture for M-profile (TBSA-M) follows
in the spirit of TBSA for A-profile
 TBSA-M will specify HW requirements for secure M-profile based
systems
 NVM, Cryptographic Keys, Trusted Boot, Trusted Timers, True Random Number
Generator (TRNG), Cryptographic Acceleration, etc.
ARMv8-M /
Cortex-M
Microcontroller
TRNG
Unique
ID
Crypto
Secure
storage
Physical IP
Hardware
Interfaces
Trusted Base System Architecture
for M-profile (TBSA-M)
Defines HW requirements for
security functionality for TrustZone-
based systems
©ARM 20167
ARM will define a Platform Security Architecture (PSA)
Ecosystem need PSA requirements
Reduce cost and complexity for the
SW development ecosystem by
reducing API fragmentation
Reduce cost and complexity for
SoC designers by guiding security
use-case decomposition onto the
building blocks defined by the
TBSA (A and M)
1. Define a standard higher-level functional
SW interface between the TrustZone®
Secure and Non-Secure worlds
2. Re-use of standard industry APIs
3. Define a ‘sandbox’ security model
4. Provide a reference implementation to
demonstrate good practice (like the A-
class Trusted Firmware did)
5. Use the fundamental HW platform
security functions that are specified in
TBSA
Reduce partner
development
cost
©ARM 20168
PSA will provide an interface to the functional building
blocks of a secure system
 Providing access to existing industry standard APIs
 New functional-level APIs for Non-Secure code to call
 Discovery mechanism to describe functionality of the platform
Non-Secure Secure
OS Kernel
EL3
Monitor / Firmware
AppApp
T OS
TA TA
EL1
EL2 Hypervisor
OS Kernel
EL0 AppApp
Hardware
Symmetric
Crypto Accl
Asymmetric
Crypto Accl
TRNG
(Entropy)
Counter /
Fuse Logic
Device
Lifecycle
Boot ROM
Trusted
Boot code
Trusted
Firmware
Discovery
API
Provisioned
Key Store
FW
Update
Asymmetric
Crypto
Serv.
Symmetric
Crypto
Serv.
Secure
Storage
GP TEE
Disk
Encryption
PSAI/F
©ARM 20169
A sandbox security model will allow mutually untrusted
functions
 The Platform Security Architecture will use a ‘sandbox’ security model
 Each security function can be placed in its own hardware enforced
partition
 Reducing the trusted compute base for each function
 Allowing functions to be mutually untrusting, to ease multiple vendor
sourcing
 We generically refer to this functionality as the ‘Secure Partition
Manager’
 In mbed OS this is implemented by the uvisor
 On A-profile devices this could be implemented by a TEE
©ARM 201610
A discovery mechanism will enable re-use of existing
secure APIs
 PSA will not replace or redefine existing secure interfaces
 It is an interface to describe them
 It is envisioned that the secure discovery mechanism will:
 Enable the uniform discovery of platform security functions, describing capabilities
and access parameters
 Provide a framework to add new functions in the future
 We expect that there will be segment-specific higher-level PSA profiles
built on a common API
©ARM 201611
ARM Cortex-M
v8-M
Microcontroller
TRNG
Unique ID
CryptoCell
Secure storage
Physical IP
Privileged
Hardware Interfaces
Normal world code Trusted software
Unprivileged
Platform code
mbed uVisor
PSA illustrated with mbed TLS in mbed OS
 mbed OS is prototyping PSA to reduce the
attack surface for secure components
 mbed TLS library in mbed OS is currently in the
Non-Secure world
 In order to reduce the attack surface, we can
now use PSA and split it into a critical and
exposed part:
 Authentication and encryption keys are protected
against malware
 Malware can’t interfere without knowing the encryption
or signing keys
mbed Crypto
(libmbedcrypto
)
CryptoAPI
mbed TLS
(libmbedtls)
mbed Crypto
(libmbedcrypto
)
©ARM 201612
Summary
The Platform Security Architecture (PSA) will build on existing security
standards and technology to make SW developers’ lives easier:
1. It is intended to prevent future SW fragmentation
2. It builds on existing standards
3. It will be proven by a reference implementation
Why are we telling you this now?
 As a heads-up that it’s coming
 To get your early feedback
 To help us all align on a common solution
Contact: Andrew Thoelke, Systems Architect
The trademarks featured in this presentation are registered and/or unregistered trademarks of ARM
Limited (or its subsidiaries) in the EU and/or elsewhere. All rights reserved. All other marks
featured may be trademarks of their respective owners.
Copyright © 2016 ARM Limited
©ARM 2016
The trademarks featured in this presentation are registered and/or unregistered trademarks of ARM
Limited (or its subsidiaries) in the EU and/or elsewhere. All rights reserved. All other marks
featured may be trademarks of their respective owners.
Copyright © 2016 ARM Limited

More Related Content

What's hot (20)

PDF
LAS16-402: ARM Trusted Firmware – from Enterprise to Embedded
Linaro
 
PDF
LCA14: LCA14-418: Testing a secure framework
Linaro
 
PDF
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Linaro
 
PDF
BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1
Linaro
 
PDF
Trusted firmware deep_dive_v1.0_
Linaro
 
PDF
Lcu14 306 - OP-TEE Future Enhancements
Linaro
 
PDF
BUD17-400: Secure Data Path with OPTEE
Linaro
 
PDF
Software, Over the Air (SOTA) for Automotive Grade Linux (AGL)
Leon Anavi
 
PPTX
HKG18-223 - Trusted FirmwareM: Trusted boot
Linaro
 
PDF
HKG18-402 - Build secure key management services in OP-TEE
Linaro
 
PDF
Q2.12: Power Management Across OSs
Linaro
 
PDF
BUD17-416: Benchmark and profiling in OP-TEE
Linaro
 
PDF
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
Linaro
 
PDF
HKG15-311: OP-TEE for Beginners and Porting Review
Linaro
 
PDF
SFO15-TR9: PSCI, ACPI (and UEFI to boot)
Linaro
 
PDF
LAS16-400K2: TianoCore – Open Source UEFI Community Update
Linaro
 
PDF
LAS16-100K1: Welcome Keynote
Linaro
 
PDF
Resilient IoT Security: The end of flat security models
Milosch Meriac
 
PDF
LAS16-200: Firmware summit - Tianocore Progress and Status
Linaro
 
PDF
BKK16-105 HALs for LITE
Linaro
 
LAS16-402: ARM Trusted Firmware – from Enterprise to Embedded
Linaro
 
LCA14: LCA14-418: Testing a secure framework
Linaro
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Linaro
 
BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1
Linaro
 
Trusted firmware deep_dive_v1.0_
Linaro
 
Lcu14 306 - OP-TEE Future Enhancements
Linaro
 
BUD17-400: Secure Data Path with OPTEE
Linaro
 
Software, Over the Air (SOTA) for Automotive Grade Linux (AGL)
Leon Anavi
 
HKG18-223 - Trusted FirmwareM: Trusted boot
Linaro
 
HKG18-402 - Build secure key management services in OP-TEE
Linaro
 
Q2.12: Power Management Across OSs
Linaro
 
BUD17-416: Benchmark and profiling in OP-TEE
Linaro
 
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
Linaro
 
HKG15-311: OP-TEE for Beginners and Porting Review
Linaro
 
SFO15-TR9: PSCI, ACPI (and UEFI to boot)
Linaro
 
LAS16-400K2: TianoCore – Open Source UEFI Community Update
Linaro
 
LAS16-100K1: Welcome Keynote
Linaro
 
Resilient IoT Security: The end of flat security models
Milosch Meriac
 
LAS16-200: Firmware summit - Tianocore Progress and Status
Linaro
 
BKK16-105 HALs for LITE
Linaro
 

Viewers also liked (20)

PDF
BKK16-200 Designing Security into low cost IO T Systems
Linaro
 
PDF
Practical real-time operating system security for the masses
Milosch Meriac
 
PPTX
mbed Connect Asia 2016 Developing IoT devices with mbed OS 5
armmbed
 
PPTX
LAS16-300K2: Geoff Thorpe - IoT Zephyr
Shovan Sargunam
 
PPTX
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
armmbed
 
PDF
Archermind demo for MTK X20 Pro and Mstar TV 96Boards
Linaro
 
PDF
LAS16-504: Secure Storage updates in OP-TEE
Linaro
 
PDF
LAS16-403: GDB Linux Kernel Awareness
Linaro
 
PDF
LAS16-500: The Rise and Fall of Assembler and the VGIC from Hell
Linaro
 
PDF
BKK16-103 OpenCSD - Open for Business!
Linaro
 
PDF
Mr201303 trust zone
FFRI, Inc.
 
PDF
BKK16-505 Kernel and Bootloader Consolidation and Upstreaming
Linaro
 
PDF
BKK16-309A Open Platform support in UEFI
Linaro
 
PDF
BKK16-211 Internet of Tiny Linux (io tl)- Status and Progress
Linaro
 
PDF
Learning notes on Open Source License
SZ Lin
 
PDF
Implementing a Security strategy in IoT, Practical example Automotive Grade L...
LibreCon
 
PPTX
y2038 issue
SZ Lin
 
PDF
淺談 Live patching technology
SZ Lin
 
PPTX
Distributed Compiler Icecc
SZ Lin
 
PDF
TIZEN Application Validation
Ryo Jin
 
BKK16-200 Designing Security into low cost IO T Systems
Linaro
 
Practical real-time operating system security for the masses
Milosch Meriac
 
mbed Connect Asia 2016 Developing IoT devices with mbed OS 5
armmbed
 
LAS16-300K2: Geoff Thorpe - IoT Zephyr
Shovan Sargunam
 
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
armmbed
 
Archermind demo for MTK X20 Pro and Mstar TV 96Boards
Linaro
 
LAS16-504: Secure Storage updates in OP-TEE
Linaro
 
LAS16-403: GDB Linux Kernel Awareness
Linaro
 
LAS16-500: The Rise and Fall of Assembler and the VGIC from Hell
Linaro
 
BKK16-103 OpenCSD - Open for Business!
Linaro
 
Mr201303 trust zone
FFRI, Inc.
 
BKK16-505 Kernel and Bootloader Consolidation and Upstreaming
Linaro
 
BKK16-309A Open Platform support in UEFI
Linaro
 
BKK16-211 Internet of Tiny Linux (io tl)- Status and Progress
Linaro
 
Learning notes on Open Source License
SZ Lin
 
Implementing a Security strategy in IoT, Practical example Automotive Grade L...
LibreCon
 
y2038 issue
SZ Lin
 
淺談 Live patching technology
SZ Lin
 
Distributed Compiler Icecc
SZ Lin
 
TIZEN Application Validation
Ryo Jin
 
Ad

Similar to LAS16-203: Platform security architecture for embedded devices (20)

PDF
A practical approach to securing embedded and io t platforms
Arm
 
PPTX
Thesis presentation
CHIACHE lee
 
PDF
Software development in ar mv8 m architecture - yiu
Arm
 
PPTX
Security for io t apr 29th mentor embedded hangout
mentoresd
 
PPTX
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Linaro
 
PPT
Track f evolving trusted platforms - arm
chiportal
 
PDF
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
FFRI, Inc.
 
PDF
High end security for low-end microcontrollers
Milosch Meriac
 
PDF
BKK16-110~---3892hnfi2r8ru94jofmcw8ujd.pdf
satyabratmallaBujarb
 
DOCX
08680982.pdfArchitectures for Security A comparative anal.docx
croftsshanon
 
PDF
Developing functional safety systems with arm architecture solutions stroud
Arm
 
PDF
PSA Certified – building trust in IoT
Duncan Purves
 
PDF
LAS16 111 - Raspberry pi3, op-tee and jtag debugging
96Boards
 
PDF
6 andrii grygoriev - security issues in arm trust zone software
Ievgenii Katsan
 
PDF
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
FFRI, Inc.
 
PDF
Nick Stephens-how does someone unlock your phone with nose
GeekPwn Keen
 
PDF
DAIS19: On the Performance of ARM TrustZone
LEGATO project
 
PDF
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Kuniyasu Suzaki
 
PDF
The new era of mega trends securtity
Ahmed Sallam
 
PDF
Building Trust Despite Digital Personal Devices
Javier González
 
A practical approach to securing embedded and io t platforms
Arm
 
Thesis presentation
CHIACHE lee
 
Software development in ar mv8 m architecture - yiu
Arm
 
Security for io t apr 29th mentor embedded hangout
mentoresd
 
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Linaro
 
Track f evolving trusted platforms - arm
chiportal
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
FFRI, Inc.
 
High end security for low-end microcontrollers
Milosch Meriac
 
BKK16-110~---3892hnfi2r8ru94jofmcw8ujd.pdf
satyabratmallaBujarb
 
08680982.pdfArchitectures for Security A comparative anal.docx
croftsshanon
 
Developing functional safety systems with arm architecture solutions stroud
Arm
 
PSA Certified – building trust in IoT
Duncan Purves
 
LAS16 111 - Raspberry pi3, op-tee and jtag debugging
96Boards
 
6 andrii grygoriev - security issues in arm trust zone software
Ievgenii Katsan
 
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
FFRI, Inc.
 
Nick Stephens-how does someone unlock your phone with nose
GeekPwn Keen
 
DAIS19: On the Performance of ARM TrustZone
LEGATO project
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Kuniyasu Suzaki
 
The new era of mega trends securtity
Ahmed Sallam
 
Building Trust Despite Digital Personal Devices
Javier González
 
Ad

More from Linaro (20)

PDF
Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Linaro
 
PDF
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Linaro
 
PDF
Huawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Linaro
 
PDF
Bud17 113: distribution ci using qemu and open qa
Linaro
 
PDF
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
Linaro
 
PDF
HPC network stack on ARM - Linaro HPC Workshop 2018
Linaro
 
PDF
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
Linaro
 
PDF
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Linaro
 
PDF
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Linaro
 
PDF
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
Linaro
 
PDF
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
Linaro
 
PDF
HKG18-100K1 - George Grey: Opening Keynote
Linaro
 
PDF
HKG18-318 - OpenAMP Workshop
Linaro
 
PDF
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
Linaro
 
PDF
HKG18-315 - Why the ecosystem is a wonderful thing, warts and all
Linaro
 
PDF
HKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
Linaro
 
PDF
HKG18-TR08 - Upstreaming SVE in QEMU
Linaro
 
PDF
HKG18-113- Secure Data Path work with i.MX8M
Linaro
 
PPTX
HKG18-120 - Devicetree Schema Documentation and Validation
Linaro
 
PDF
HKG18-500K1 - Keynote: Dileep Bhandarkar - Emerging Computing Trends in the D...
Linaro
 
Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Linaro
 
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Linaro
 
Huawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Linaro
 
Bud17 113: distribution ci using qemu and open qa
Linaro
 
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
Linaro
 
HPC network stack on ARM - Linaro HPC Workshop 2018
Linaro
 
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
Linaro
 
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Linaro
 
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Linaro
 
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
Linaro
 
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
Linaro
 
HKG18-100K1 - George Grey: Opening Keynote
Linaro
 
HKG18-318 - OpenAMP Workshop
Linaro
 
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
Linaro
 
HKG18-315 - Why the ecosystem is a wonderful thing, warts and all
Linaro
 
HKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
Linaro
 
HKG18-TR08 - Upstreaming SVE in QEMU
Linaro
 
HKG18-113- Secure Data Path work with i.MX8M
Linaro
 
HKG18-120 - Devicetree Schema Documentation and Validation
Linaro
 
HKG18-500K1 - Keynote: Dileep Bhandarkar - Emerging Computing Trends in the D...
Linaro
 

Recently uploaded (20)

PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
Biography of Daniel Podor.pdf
Daniel Podor
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
Biography of Daniel Podor.pdf
Daniel Podor
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 

LAS16-203: Platform security architecture for embedded devices

  • 1. ©ARM 2016 LAS16-203: Platform Security Architecture for embedded devices Linaro Connect September 2016 Mark Hambleton Senior Director Systems and Software Group
  • 2. ©ARM 20162 Secure systems are being deployed everywhere  Secure systems can already be found in diverse industries and markets, although no security implementation can be perfect  These secure systems provide mechanisms such as authentication, integrity checking, and confidentiality to protect assets across multiple use-cases Example market Example use-cases Mobile Identity, Payments, DRM IoT Device Management and Identity Enterprise/Server/Networkin g SW attestation and Secure Execution Automotive Safety Critical systems
  • 3. ©ARM 20163 ARM TrustZone® enables the ecosystem on A-class secure systems Global platform standardization Initial RoT & security subsystem TrustZone-based TEE Common foundation Hardware Interfaces Normal world code Trusted software ARM Trusted Firmware Trusted boot Payload dispatcherSMCCC PSCI EL1 EL2 Secure device drivers Hypervisor Apps ARMv8A / Cortex-A SoC subsystem Graphics Video Crypto Secure store Physical IP Trusted apps Payment DRM Rich OS Device drivers Trusted OS Here’s a reminder of the architecture Ecosyste m supplied Trusted SW/HW Key
  • 4. ©ARM 20164 TrustZone is defined and supported by existing standards and reference implementations Hardware Interfaces Normal world code Trusted software ARM Trusted Firmware Trusted boot Payload dispatcherSMCCC PSCI EL1 EL2 Apps ARMv8A / Cortex-A SoC subsystem Graphics Video Crypto Secure store Physical IP Trusted Board Boot Requirements (TBBR) Defines a secure boot process to be compliant with GlobalPlatform TEE Protection Profile 1.2 Trusted Firmware (TF) Implements a trusted boot flow Trusted Base System Architecture (TBSA) Defines HW requirements for security functionality for TrustZone-based systems
  • 5. ©ARM 20165 ARMv8-M brings TrustZone to the microcontroller market Global platform standardization Initial RoT & security subsystem TrustZone-based TEE Common foundation Hardware Interfaces Normal world code Trusted software ARM Trusted Firmware Trusted boot Payload dispatcherSMCCC PSCI EL1 EL2 Secure device drivers Hypervisor Apps ARMv8A / Cortex-A SoC subsystem Graphics Video CryptoCell Secure storage Physical IP Trusted apps Payment DRM Rich OS Device drivers Trusted OS ARMv8M / Cortex-M Microcontroller TRNG Unique ID CryptoCell Secure storage Physical IP Privileged Hardware Interfaces Normal world code Trusted software Device drivers Unprivileged RTOS scheduler Platform code Secure Partitioning Manager Trusted libs Crypto Attestation TrustZone-based SPM Comms stack Apps/user TLS/Crypto libs Initial RoT & security subsystem CMSIS APIs ARMv8-A ARMv8-M
  • 6. ©ARM 20166 We are defining TBSA for M-profile for SoC designers  The Trusted Base System Architecture for M-profile (TBSA-M) follows in the spirit of TBSA for A-profile  TBSA-M will specify HW requirements for secure M-profile based systems  NVM, Cryptographic Keys, Trusted Boot, Trusted Timers, True Random Number Generator (TRNG), Cryptographic Acceleration, etc. ARMv8-M / Cortex-M Microcontroller TRNG Unique ID Crypto Secure storage Physical IP Hardware Interfaces Trusted Base System Architecture for M-profile (TBSA-M) Defines HW requirements for security functionality for TrustZone- based systems
  • 7. ©ARM 20167 ARM will define a Platform Security Architecture (PSA) Ecosystem need PSA requirements Reduce cost and complexity for the SW development ecosystem by reducing API fragmentation Reduce cost and complexity for SoC designers by guiding security use-case decomposition onto the building blocks defined by the TBSA (A and M) 1. Define a standard higher-level functional SW interface between the TrustZone® Secure and Non-Secure worlds 2. Re-use of standard industry APIs 3. Define a ‘sandbox’ security model 4. Provide a reference implementation to demonstrate good practice (like the A- class Trusted Firmware did) 5. Use the fundamental HW platform security functions that are specified in TBSA Reduce partner development cost
  • 8. ©ARM 20168 PSA will provide an interface to the functional building blocks of a secure system  Providing access to existing industry standard APIs  New functional-level APIs for Non-Secure code to call  Discovery mechanism to describe functionality of the platform Non-Secure Secure OS Kernel EL3 Monitor / Firmware AppApp T OS TA TA EL1 EL2 Hypervisor OS Kernel EL0 AppApp Hardware Symmetric Crypto Accl Asymmetric Crypto Accl TRNG (Entropy) Counter / Fuse Logic Device Lifecycle Boot ROM Trusted Boot code Trusted Firmware Discovery API Provisioned Key Store FW Update Asymmetric Crypto Serv. Symmetric Crypto Serv. Secure Storage GP TEE Disk Encryption PSAI/F
  • 9. ©ARM 20169 A sandbox security model will allow mutually untrusted functions  The Platform Security Architecture will use a ‘sandbox’ security model  Each security function can be placed in its own hardware enforced partition  Reducing the trusted compute base for each function  Allowing functions to be mutually untrusting, to ease multiple vendor sourcing  We generically refer to this functionality as the ‘Secure Partition Manager’  In mbed OS this is implemented by the uvisor  On A-profile devices this could be implemented by a TEE
  • 10. ©ARM 201610 A discovery mechanism will enable re-use of existing secure APIs  PSA will not replace or redefine existing secure interfaces  It is an interface to describe them  It is envisioned that the secure discovery mechanism will:  Enable the uniform discovery of platform security functions, describing capabilities and access parameters  Provide a framework to add new functions in the future  We expect that there will be segment-specific higher-level PSA profiles built on a common API
  • 11. ©ARM 201611 ARM Cortex-M v8-M Microcontroller TRNG Unique ID CryptoCell Secure storage Physical IP Privileged Hardware Interfaces Normal world code Trusted software Unprivileged Platform code mbed uVisor PSA illustrated with mbed TLS in mbed OS  mbed OS is prototyping PSA to reduce the attack surface for secure components  mbed TLS library in mbed OS is currently in the Non-Secure world  In order to reduce the attack surface, we can now use PSA and split it into a critical and exposed part:  Authentication and encryption keys are protected against malware  Malware can’t interfere without knowing the encryption or signing keys mbed Crypto (libmbedcrypto ) CryptoAPI mbed TLS (libmbedtls) mbed Crypto (libmbedcrypto )
  • 12. ©ARM 201612 Summary The Platform Security Architecture (PSA) will build on existing security standards and technology to make SW developers’ lives easier: 1. It is intended to prevent future SW fragmentation 2. It builds on existing standards 3. It will be proven by a reference implementation Why are we telling you this now?  As a heads-up that it’s coming  To get your early feedback  To help us all align on a common solution Contact: Andrew Thoelke, Systems Architect
  • 13. The trademarks featured in this presentation are registered and/or unregistered trademarks of ARM Limited (or its subsidiaries) in the EU and/or elsewhere. All rights reserved. All other marks featured may be trademarks of their respective owners. Copyright © 2016 ARM Limited ©ARM 2016 The trademarks featured in this presentation are registered and/or unregistered trademarks of ARM Limited (or its subsidiaries) in the EU and/or elsewhere. All rights reserved. All other marks featured may be trademarks of their respective owners. Copyright © 2016 ARM Limited

Editor's Notes

  • #6: Similar, but different
  • #11: Linkage between PSA and the TEE?