没有合适的资源?快使用搜索试试~ 我知道了~
首页DEN0021D Trusted_Base_System_Architecture_Client.pdf
资源详情
资源评论
资源推荐

TRUSTED BASE SYSTEM ARCHITECTURE, CLIENT
(4TH EDITION)
System Hardware on ARM
®
Document number: ARM DEN 0021D
Copyright © 2012, 2016, 2018, ARM Limited or its affiliates

2 Copyright
©
2012, 2016, 2018, ARM Limited or its affiliates. All rights reserved. ARM DEN 0021D
Non-Confidential
Trusted Base System Architecture, Client (4th Edition)
System Hardware on ARM
Copyright © 2012, 2016, 2018, ARM Limited or its affiliates. All rights reserved.
Release information
Table 1 lists the changes made to this document.
Table 1 Change history
Date
Issue
Confidentiality
Change
20 January 2012
A
Confidential
First release
21 March 2012
B
Confidential
Second release
26 September 2016
C
Confidential
3
rd
Edition. Update and restructure document. Draft release
15 October 2018
D
Non-Confidential
4
th
Edition. Non-confidential release.
Intermediate releases, numbered A-3 to A-9, were issued to a restricted circulation
Non-Confidential Proprietary Notice
This document is protected by copyright and other related rights and the practice or implementation of the
information contained in this document may be protected by one or more patents or pending patent applications.
No part of this document may be reproduced in any form by any means without the express prior written
permission of Arm. No license, express or implied, by estoppel or otherwise to any intellectual property rights is
granted by this document unless specifically stated.
Your access to the information in this document is conditional upon your acceptance that you will not use or
permit others to use the information for the purposes of determining whether implementations infringe any third
party patents.
THIS DOCUMENT IS PROVIDED “AS IS”. ARM PROVIDES NO REPRESENTATIONS AND NO WARRANTIES,
EXPRESS, IMPLIED OR STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
MERCHANTABILITY, SATISFACTORY QUALITY, NON-INFRINGEMENT OR FITNESS FOR A PARTICULAR
PURPOSE WITH RESPECT TO THE DOCUMENT. For the avoidance of doubt, Arm makes no representation
with respect to, and has undertaken no analysis to identify or understand the scope and content of, patents,
copyrights, trade secrets, or other rights.
This document may include technical inaccuracies or typographical errors.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL ARM BE LIABLE FOR ANY DAMAGES,
INCLUDING WITHOUT LIMITATION ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE, OR
CONSEQUENTIAL DAMAGES, HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF LIABILITY,
ARISING OUT OF ANY USE OF THIS DOCUMENT, EVEN IF ARM HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
This document consists solely of commercial items. You shall be responsible for ensuring that any use,
duplication or disclosure of this document complies fully with any relevant export laws and regulations to assure
that this document or any portion thereof is not exported, directly or indirectly, in violation of such export laws.
Use of the word “partner” in reference to Arm’s customers is not intended to create or refer to any partnership
relationship with any other company. Arm may make changes to this document at any time and without notice.
If any of the provisions contained in these terms conflict with any of the provisions of any click through or signed
written agreement covering this document with Arm, then the click through or signed written agreement prevails
over and supersedes the conflicting provisions of these terms. This document may be translated into other
languages for convenience, and you agree that if there
is any conflict between the English version of this document and any translation, the terms of the English version
of the Agreement shall prevail.
The Arm corporate logo and words marked with ® or ™ are registered trademarks or trademarks of Arm Limited
(or its subsidiaries) in the US and/or elsewhere. All rights reserved. Other brands and names mentioned in this
document may be the trademarks of their respective owners. Please follow Arm’s trademark usage guidelines at
http://www.arm.com/company/policies/trademarks.

ARM DEN 0021D Copyright
©
2012, 2016, 2018 ARM Limited or its affiliates. All rights reserved. 3
Non-Confidential
Copyright ©2018 Arm Limited (or its affiliates). All rights reserved.
Arm Limited. Company 02557590 registered in England.
110 Fulbourn Road, Cambridge, England CB1 9NJ.
LES-PRE-20349


Table of Contents
ARM DEN 0021D Copyright
©
2012, 2016, 2018 ARM Limited or its affiliates. All rights reserved. 5
Non-Confidential
Table of contents
1 Introduction .................................................................................................. 6
1.1 Additional reading ................................................................................. 6
1.2 Target platform ..................................................................................... 7
2 Use cases ..................................................................................................... 8
2.1 User privacy .......................................................................................... 8
2.2 Digital Rights Management .................................................................. 9
2.3 FIDO ..................................................................................................... 9
2.4 Enterprise system support .................................................................. 10
2.5 Mobile Network Operators .................................................................. 11
3 Security threats .......................................................................................... 12
3.1 Threats ................................................................................................ 12
3.2 Attackers ............................................................................................. 13
4 TrustZone
®
technology ............................................................................. 16
4.1 Execution model ................................................................................. 17
4.2 Memory access................................................................................... 18
5 TBSA architecture variants....................................................................... 20
5.1 Baseline architecture .......................................................................... 22
5.2 Assisted architecture .......................................................................... 22
6 TBSA security requirements .................................................................... 23
6.1 System view ........................................................................................ 23
6.2 Infrastructure ....................................................................................... 23
6.3 Fuses .................................................................................................. 31
6.4 Cryptographic keys ............................................................................. 33
6.5 Trusted boot ........................................................................................ 37
6.6 Trusted timers ..................................................................................... 39
6.7 Version counters ................................................................................. 41
6.8 Entropy source.................................................................................... 42
6.9 Cryptographic acceleration ................................................................. 44
6.10 Debug ................................................................................................. 45
6.11 External interface peripherals ............................................................. 51
6.12 DRAM protection ................................................................................ 53
7 Device lifecycle .......................................................................................... 57
8 Approved algorithms ................................................................................. 59
Glossary................................................................................................................. 60
剩余59页未读,继续阅读



















模范胡萝卜
- 粉丝: 2
- 资源: 2
上传资源 快速赚钱
我的内容管理 收起
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助

会员权益专享
最新资源
- Xilinx SRIO详解.pptx
- Informatica PowerCenter 10.2 for Centos7.6安装配置说明.pdf
- 现代无线系统射频电路实用设计卷II 英文版.pdf
- 电子产品可靠性设计 自己讲课用的PPT,包括设计方案的可靠性选择,元器件的选择与使用,降额设计,热设计,余度设计,参数优化设计 和 失效分析等
- MPC5744P-DEV-KIT-REVE-QSG.pdf
- 通信原理课程设计报告(ASK FSK PSK Matlab仿真--数字调制技术的仿真实现及性能研究)
- ORIGIN7.0使用说明
- 在VMware Player 3.1.3下安装Redhat Linux详尽步骤
- python学生信息管理系统实现代码
- 西门子MES手册 13 OpcenterEXCR_PortalStudio1_81RB1.pdf
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈



安全验证
文档复制为VIP权益,开通VIP直接复制

评论0