Open main menu

DAVE Developer's Wiki β

Changes

Introduction
Beacause widely available Internet connectivity, nowadays security concerns are not longer limited to PCs, servers and workstations but have become common to many embedded systems as well. To deal with this kind of challenges, several hardware and software technologies have been developed. [http://www.arm.com/products/processors/technologies/trustzone/ ARM® TrustZone® technology] is one of these. As stated in <ref name="WP429">Yashu Gosain and Prushothaman Palanichamy, ''Xilinx WP429 - TrustZone Technology Support in Zynq-7000 All Programmable SoCs (v1.0)'', May 20, 2014</ref>, Xilinx Zynq-7000 AP SoC natively supports [http://www.arm.com/products/processors/technologies/trustzone/ TrustZone® technology], since it integrates dual-core ARM® Cortex™-A9 MPCore™ processor.
Even if this technology has been conceived primarily to address security issues, embedded systems designers can leverage it to implement innovative configurations , satisfying different in nature requirements that typically arise in industrial applications and deep embedded systems{{efn|These kind of requirements are often totally independent of Internet connectivity}}. Two of such requirements are real-timeness and system integrity (a). This White Paper describes {{efn|In this context, for the terms '''integrity''' and '''security''' the TrustZonedefinitions provided by <ref name="WP461">Ed Hallett, Giulio Corradi, Steven McNeil, ''Xilinx WP461 -based solution that DAVE Embedded Systems has implemented to meet all these requirements on [[:Category:Bora|BORA]] Xilinx Reduces Risk and Increases Efficiency for IEC61508 and [[:Category:BoraX|BORAX]] platformsISO26262 Certified Safety Applications (v1. Also0)'', April 9, characterization tests 2015</ref> are detailedin use:* '''security''' refers to a system’s immunity to data disclosure or loss as a result of the unlawful electronic penetration of the system’s protections and defenses* '''integrity''' denotes the certainty that a system cannot be improperly altered.}}.
This White Paper describes the TrustZone-based solution can be considered as a sort of natural evolution that DAVE Embedded Systems has implemented to meet all these requirements on the traditional AMP configuration described in <ref name="AN-BELK-001">AN-BELK-001[[:Category: Asymmetric Multiprocessing (AMP) on Bora – Linux FreeRTOS, |BORA]] and [[AN-BELK-001:_Asymmetric_Multiprocessing_(AMP)_on_Bora_–_Linux_FreeRTOSCategory:BoraX|BORAX]]</ref>platforms. For this reason, reading A technical description of this document the adopted approach is higly recommendedprovided. Also, performance and characterization tests are detailed and considerations about future developments and improvements are included.
 TBD trasformare in footnote efn(This solution can be considered as a) In this context, for sort of natural evolution on the terms '''integrity''' and '''security''' the definitions provided by traditional AMP configuration described in <ref name="WP461AN-BELK-001">Ed HallettAN-BELK-001: Asymmetric Multiprocessing (AMP) on Bora – Linux FreeRTOS, Giulio Corradi, Steven McNeil, ''Xilinx WP461 [[AN-BELK- Xilinx Reduces Risk and Increases Efficiency for IEC61508 and ISO26262 Certified Safety Applications 001:_Asymmetric_Multiprocessing_(v1.0AMP)'', April 9, 2015_on_Bora_–_Linux_FreeRTOS]]</ref> are in use:* '''security''' refers to a system’s immunity to data disclosure or loss as a result . For this reason, reading of the unlawful electronic penetration of the system’s protections and defenses* '''integrity''' denotes the certainty that a system cannot be improperly alteredthis document is highly recommended.
==Limitations of traditional AMP configurations==
4,650
edits