Difference between revisions of "BELK-TN-001: Real-timeness, system integrity and TrustZone® technology on AMP configuration"

From DAVE Developer's Wiki
Jump to: navigation, search
(Introduction)
(Introduction)
Line 21: Line 21:
 
Beacause widely available Internet connectivity, nowadays security concerns are not longer limited to PCs, servers and workstations but have become common to many embedded systems as well. To deal with this kind of challenges, several hardware and software technologies have been developed. [http://www.arm.com/products/processors/technologies/trustzone/ ARM® TrustZone® technology] is one of these. As stated in <ref name="WP429">Yashu Gosain and Prushothaman Palanichamy, ''Xilinx WP429 - TrustZone Technology Support in Zynq-7000 All Programmable SoCs (v1.0)'', May 20, 2014</ref>, Xilinx Zynq-7000 AP SoC natively supports [http://www.arm.com/products/processors/technologies/trustzone/ TrustZone® technology], since it integrates dual-core ARM® Cortex™-A9 MPCore™ processor.  
 
Beacause widely available Internet connectivity, nowadays security concerns are not longer limited to PCs, servers and workstations but have become common to many embedded systems as well. To deal with this kind of challenges, several hardware and software technologies have been developed. [http://www.arm.com/products/processors/technologies/trustzone/ ARM® TrustZone® technology] is one of these. As stated in <ref name="WP429">Yashu Gosain and Prushothaman Palanichamy, ''Xilinx WP429 - TrustZone Technology Support in Zynq-7000 All Programmable SoCs (v1.0)'', May 20, 2014</ref>, Xilinx Zynq-7000 AP SoC natively supports [http://www.arm.com/products/processors/technologies/trustzone/ TrustZone® technology], since it integrates dual-core ARM® Cortex™-A9 MPCore™ processor.  
  
Even if this technology has been conceived primarily to address security issues, embedded systems designers can leverage it to implement innovative configurations satisfying different in nature requirements that typically arise in industrial applications and deep embedded systems{{efn|These kind of requirements are often totally independent of Internet connectivity}}. Two of such requirements are real-timeness and system integrity.  
+
Even if this technology has been conceived primarily to address security issues, embedded systems designers can leverage it to implement innovative configurations satisfying different in nature requirements that typically arise in industrial applications and deep embedded systems{{efn|These kind of requirements are often totally independent of Internet connectivity}}. Two of such requirements are real-timeness and system integrity (a). This White Paper describes the TrustZone-based solution that DAVE Embedded Systems has implemented to meet all these requirements on [[:Category:Bora|BORA]] and [[:Category:BoraX|BORAX]] platforms. This solution can be considered as a sort of natural evolution on the traditional AMP configuration described in <ref name="AN-BELK-001">AN-BELK-001: Asymmetric Multiprocessing (AMP) on Bora – Linux FreeRTOS, AN-BELK-[[001:_Asymmetric_Multiprocessing_(AMP)_on_Bora_–_Linux_FreeRTOS]]</ref>. For this reason, reading of this document is higly recommended.
  
In this context, for the terms '''integrity''' and '''security''' the definitions provided by <ref name="WP461">Ed Hallett, Giulio Corradi, Steven McNeil, ''Xilinx WP461 - Xilinx Reduces Risk and Increases Efficiency for IEC61508 and ISO26262 Certified Safety Applications (v1.0)'', April 9, 2015</ref> are in use:
+
 
 +
 
 +
TBD trasformare in footnote efn
 +
(a) In this context, for the terms '''integrity''' and '''security''' the definitions provided by <ref name="WP461">Ed Hallett, Giulio Corradi, Steven McNeil, ''Xilinx WP461 - Xilinx Reduces Risk and Increases Efficiency for IEC61508 and ISO26262 Certified Safety Applications (v1.0)'', April 9, 2015</ref> are in use:
 
* '''security''' refers to a system’s immunity to data disclosure or loss as a result of the unlawful electronic penetration of the system’s protections and defenses
 
* '''security''' refers to a system’s immunity to data disclosure or loss as a result of the unlawful electronic penetration of the system’s protections and defenses
 
* '''integrity''' denotes the certainty that a system cannot be improperly altered.
 
* '''integrity''' denotes the certainty that a system cannot be improperly altered.

Revision as of 15:39, 16 September 2015

Info Box
Bora5-small.jpg Applies to Bora
BORA Xpress.png Applies to BORA Xpress

History[edit | edit source]

Version Date BELK version Notes
0.9.0 September 2015 3.0.0 Internal draft

Introduction[edit | edit source]

Beacause widely available Internet connectivity, nowadays security concerns are not longer limited to PCs, servers and workstations but have become common to many embedded systems as well. To deal with this kind of challenges, several hardware and software technologies have been developed. ARM® TrustZone® technology is one of these. As stated in [1], Xilinx Zynq-7000 AP SoC natively supports TrustZone® technology, since it integrates dual-core ARM® Cortex™-A9 MPCore™ processor.

Even if this technology has been conceived primarily to address security issues, embedded systems designers can leverage it to implement innovative configurations satisfying different in nature requirements that typically arise in industrial applications and deep embedded systems[a]. Two of such requirements are real-timeness and system integrity (a). This White Paper describes the TrustZone-based solution that DAVE Embedded Systems has implemented to meet all these requirements on BORA and BORAX platforms. This solution can be considered as a sort of natural evolution on the traditional AMP configuration described in [2]. For this reason, reading of this document is higly recommended.


TBD trasformare in footnote efn (a) In this context, for the terms integrity and security the definitions provided by [3] are in use:

  • security refers to a system’s immunity to data disclosure or loss as a result of the unlawful electronic penetration of the system’s protections and defenses
  • integrity denotes the certainty that a system cannot be improperly altered.

References[edit | edit source]

  1. Yashu Gosain and Prushothaman Palanichamy, Xilinx WP429 - TrustZone Technology Support in Zynq-7000 All Programmable SoCs (v1.0), May 20, 2014
  2. AN-BELK-001: Asymmetric Multiprocessing (AMP) on Bora – Linux FreeRTOS, AN-BELK-001:_Asymmetric_Multiprocessing_(AMP)_on_Bora_–_Linux_FreeRTOS
  3. Ed Hallett, Giulio Corradi, Steven McNeil, Xilinx WP461 - Xilinx Reduces Risk and Increases Efficiency for IEC61508 and ISO26262 Certified Safety Applications (v1.0), April 9, 2015

  1. These kind of requirements are often totally independent of Internet connectivity