TZMP-1 Software Reference Implementation. Ken Liu 2018-Mar-12

Size: px
Start display at page:

Download "TZMP-1 Software Reference Implementation. Ken Liu 2018-Mar-12"

Transcription

1 TZMP-1 Software Reference Implementation Ken Liu 2018-Mar Arm Limited

2 Content DRM Applications and Secure Video Path Regular Secure Video Path Design with Trustzone TZMP1 Design Concepts Reference Implementation Details Arm Limited

3 General Process of DRM DRM Protocols Authorizing Key Exchange Encoded Content Encrypted Content Casting Video Path + - Encode/Encrypt Networking Decrypt/Decode Arm Limited

4 Ideal Model of Secure Video Path Encrypted Content - Decry pt Secured Environment Decod e + Composit e Encoded Content Decoded Frame Arm Limited

5 Content DRM Applications and Secure Video Path Regular Secure Video Path Design with Trustzone TZMP1 Design Concepts Reference Implementation Details Arm Limited

6 Arm Trustzone Non-Trusted Apps Tursted OS Non-Secure World Secure World Hardware isolated Execution Environment Trused OS Trusted Application Arm Limited

7 Regular Design with TrustZone Receiv e Non-Secure World - Decryp t Secure World Decode + Composit e Arm Limited

8 Issues of Regular Design Non-Secure OS Mature multimedia frameworks in Non-Secure OS Secure OS Video Driver Video Component Video Driver Graphics GPU Driver Display Driver Graphics Component Compositor Media Framework Porting? Video Component Graphics Driver Graphics Component Display Driver Compositor Arm Limited Non-Secure World Lack of API Runtime more attack interfaces Secure World

9 Protect Content in Non-Secure World Non-Secure Memory + Composite - Secure Memory Decry pt Protecte d Memory Decod e Protect ed Memor y Restrict accessing into single direction Could we protect content in non-secure world to avoid much changes? Arm Limited

10 Content DRM Applications and Secure Video Path Regular Secure Video Path Design with Trustzone TZMP1 Design Concepts Reference Implementation Details Arm Limited

11 Protected Memory and Secured Playback Protected Memory WO Decryptor Non-Secure CPU Non-Secure VPU Secure Bitstream RW Protected VPU Non-Secure GPU RW Protected GPU RO Display Controller RO RW RW RO Non-Secure Memory Non-Secured Bitstream Secure Bitstream could only be accessed by Protected hardware components Non-Secure Bitstream could only be accessed by Non-Secure hardware components Display controller could read both types of bitstreams Mention the word Protected leads to Protected Memory and Protected Mode of HW Arm Limited

12 Hardware Architecture of TZMP1 Cortex A Cortex A Cortex A Cortex A GPU NSAID _CPU CCI 5xx Interconnect NSAID _GPU _PROT ECTED NSAID _REE NSAID NSAID _VIDE O_PRI VPUVATE NSAID _VIDE O_PR OTECT ED NSAID _VIDE O_OU NIC-400 Interconnect TBUF NSAID TZC-400 _REE NSAID Display NSAID _DP_P ROTEC TED Memory Arm Limited

13 Firewall of Accessing - Arm Trustzone Controller 400 Region Ranges NSAID 1 NSAID 2 NSAID 16 Secure Access 0 All Memory RW Configurable RW Configurable RW Configurable RW Configurable 1 Configurable RW Configurable RW Configurable RW Configurable RW Configurable 2 Configurable RW Configurable RW Configurable RW Configurable RW Configurable 3 Configurable RW Configurable RW Configurable RW Configurable RW Configurable 4 Configurable RW Configurable RW Configurable RW Configurable RW Configurable 5 Configurable RW Configurable RW Configurable RW Configurable RW Configurable 6 Configurable RW Configurable RW Configurable RW Configurable RW Configurable Comp NSAID TZC-400 Memory 7 Configurable RW Configurable RW Configurable RW Configurable RW Configurable Each non-secure memory accessing hardware is assigned with a Non-Secure Access ID (NSAID) TZC-400 checks NSAID and region permissions to decide access availability Total 8 regions and 16 NSAIDs are supported in TZC-400 Secure accessing is also checked by TZC Arm Limited

14 Content DRM Applications and Secure Video Path Regular Secure Video Path Design with Trustzone TZMP1 Design Concepts Reference Implementation Details Arm Limited

15 Platform and Software Components Component Board Non-Secure OS Secure OS Boot Media IP DRM Description Juno-r2 + 2 x Logictile Android lsk-4.4-armlt Kernel OPTEE OS Arm-tf Arm Mali V550 G71 DP650 Clearkey / Widevine Arm Limited

16 Overall Reference Implementation ExoPlayer Media Framework SurfaceFlinger DRM Plugin Crypto CA OMX.decoder.secu re OMX.decoder Protected Surface Surface Encrypted Clear Bitstream OP-TEE OS (TEE) Crypto TA Protected Memory Non-Secure Memory Decrypted NSAID PROT VPU Decode d Clear Bitstream Drivers Hardware NSAID_PUB TZC-400 Decode d Decode d NSAID_PR OT GPU Decode d NSAID_PU B Decoded Deco ded DPU NSAI D Arm Limited

17 Required Software Modifications ExoPlayer Media Framework SurfaceFlinger DRM Plugin Crypto CA OMX.decoder.secu re OMX.decoder Protected Surface Surface SGL CA Gralloc ION OP-TEE OS (TEE) Drivers Crypto TA SGL TA Hardware TZC400 Setup NSAID PROT VPU NSAID_PUB TZC-400 NSAID_PR OT GPU NSAID_PU B DPU NSAI D Arm Limited

18 Memory Regions Android (Linux) Kernel Managed ION::UNMAPPED HEAP ION::CARVEOUT TEE PARAM X Memory Regions Non-Secure Memory SECURE FIRMWARE SECURE BITSTREAM SECURE FRAME TEE PARAM Secure Memory OPTEE OS X Secure Data Path X TEE PARAM Runtime Arm Limited

19 Secure VPU Firmware Loading Secure Gadget Library (SGL CA) OP-TEE OS SGL TA Hardware VPU NSAID_PRIV NSAID_PUB Firmware Secure Firmware Mandatory for firmware based decoder Unnecessary for non-firmware based decoder SDP Usage Non-Secure Memory SECURE FIRMWARE SECURE BITSTREAM Arm Limited

20 Adopt DRM Crypto DRM Plugin OP-TEE OS Crypto TA Decrypted Non-Secure Memory SECURE FIRMWARE SECURE BITSTREAM Encrypted Bitstream Decrypt in OPTEE OS Put result into protected memory Take advantage SDP of OPTEE OS SDP Arm Limited

21 Adopt Secure Decoder OMX.decoder.secu re Android ExoPlayer Media Framework OMX.decoder Secure Video Path in Android Is DRM required Secure Codec? Is Secure Codec available? Setup Secure Video Path Choose Secure Codec component Apply Protected Surface for output Drivers Hardware VPU NSAID_PROT NSAID_PUB Decrypted Decode d SECURE FIRMWARE SECURE BITSTREAM SECURE FRAME Arm Limited

22 Graphics and Display SurfaceFlinger Protected Surface Surface GPU and Display calls gralloc for surface buffers Gralloc allocates memory from specified buffer due to flags Call ION APIs for protected buffer Drivers Decode d NSAID_PR OT GPU Hardware NSAID_PU B Decoded DPU NSAI D SECURE FRAME Arm Limited

23 References Components Repository 1 Workspace To be upstreamed in April 2 Arm-tf (Upstreaming) 3 OPTEE OS (Done) 4 Android manifest To be upstreamed in April 5 Secure Gadget Library Upstreaming in linaro private repository 6 Gralloc 7 Multimedia IP Contact Arm support 8 Linux and DTS (Upstreaming) 9 Arm Connected Community Page Planed to be done by ~April Arm Limited

24 Thank You Danke Merci 谢谢ありがとう Gracias Kiitos 감사합니다 ध यव द תודה Arm Limited

A New Security Platform for High Performance Client SoCs

A New Security Platform for High Performance Client SoCs A New Security Platform for High Performance Client SoCs Udi Maor, Sr. Product manager, Client Line of Business October 2018 udi.maor@arm.com Agenda What are Client devices? Arm s approach to Trusted Execution

More information

DPDK on Arm64 Status Review & Plan

DPDK on Arm64 Status Review & Plan DPDK on Arm64 Status Review & Plan Song.zhu@arm.com Yi.He@arm.com Herbert.Guan@arm.com 19/03/2018 2018 Arm Limited DPDK Overview Data Plane Development Kit A set of libraries and drivers for fast packet

More information

A Developer's Guide to Security on Cortex-M based MCUs

A Developer's Guide to Security on Cortex-M based MCUs A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone

More information

The Changing Face of Edge Compute

The Changing Face of Edge Compute The Changing Face of Edge Compute 2018 Arm Limited Alvin Yang Nov 2018 Market trends acceleration of technology deployment 26 years 4 years 100 billion chips shipped 100 billion chips shipped 1 Trillion

More information

WAVE ONE MAINFRAME WAVE THREE INTERNET WAVE FOUR MOBILE & CLOUD WAVE TWO PERSONAL COMPUTING & SOFTWARE Arm Limited

WAVE ONE MAINFRAME WAVE THREE INTERNET WAVE FOUR MOBILE & CLOUD WAVE TWO PERSONAL COMPUTING & SOFTWARE Arm Limited WAVE ONE MAINFRAME WAVE THREE INTERNET WAVE FOUR MOBILE & CLOUD WAVE TWO PERSONAL COMPUTING & SOFTWARE Artificial Intelligence Fifth wave Data-driven computing era IoT Generating data 5G 5G Transporting

More information

Optimize HPC - Application Efficiency on Many Core Systems

Optimize HPC - Application Efficiency on Many Core Systems Meet the experts Optimize HPC - Application Efficiency on Many Core Systems 2018 Arm Limited Florent Lebeau 27 March 2018 2 2018 Arm Limited Speedup Multithreading and scalability I wrote my program to

More information

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat

More information

Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop

Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop Part2 Security Enclaves Tech Seminars 2017 Agenda New security technology for IoT Security Enclaves CryptoIsland

More information

A Secure and Connected Intelligent Future. Ian Smythe Senior Director Marketing, Client Business Arm Tech Symposia 2017

A Secure and Connected Intelligent Future. Ian Smythe Senior Director Marketing, Client Business Arm Tech Symposia 2017 A Secure and Connected Intelligent Future 1 2017 Arm Copyright Limited Arm 2017 Ian Smythe Senior Director Marketing, Client Business Arm Tech Symposia 2017 Arm: The Industry s Architecture of Choice 50

More information

Bringing Intelligence to Enterprise Storage Drives

Bringing Intelligence to Enterprise Storage Drives Bringing Intelligence to Enterprise Storage Drives Neil Werdmuller Director Storage Solutions Arm Santa Clara, CA 1 Who am I? 28 years experience in embedded Lead the storage solutions team Work closely

More information

New Approaches to Connected Device Security

New Approaches to Connected Device Security New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the

More information

Beyond TrustZone Part 1 - PSA

Beyond TrustZone Part 1 - PSA Beyond TrustZone Part 1 - PSA Rob Coombs Security Director, Arm Arm Tech Symposia 2017, Hsinchu Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security

More information

Unleash the DSP performance of Arm Cortex processors

Unleash the DSP performance of Arm Cortex processors Unleash the DSP performance of Arm Cortex processors Arm Tech Symposia 2017 Lionel Belnet Senior Product Manager Agenda Unleash the DSP performance of Cortex processors 1 Introducing Arm Cortex technology

More information

Accelerate Ceph By SPDK on AArch64

Accelerate Ceph By SPDK on AArch64 Accelerate Ceph By on AArch64 Jun He, jun.he@arm.com 2018 Arm Limited Tone Zhang, tone.zhang@arm.com 2018/3/9 2018 Arm Limited What s? Storage Performance Development Kit A set of tools and libraries to

More information

Protecting your system from the scum of the universe

Protecting your system from the scum of the universe Protecting your system from the scum of the universe Gilad Ben-Yossef gilad@benyossef.com Twitter: @giladby About me My name is Gilad Ben-Yossef. I work on applied cryptography and security of the upstream

More information

Introducing Poplar: First 96Boards TV Platform. Mark Gregotski, Director LHG Hermit Wang, SW Architect, Digital Media IC & Solutions HiSilicon

Introducing Poplar: First 96Boards TV Platform. Mark Gregotski, Director LHG Hermit Wang, SW Architect, Digital Media IC & Solutions HiSilicon Introducing Poplar: First 96Boards TV Platform Mark Gregotski, Director LHG Hermit Wang, SW Architect, Digital Media IC & Solutions HiSilicon Overview General Information Poplar Hardware ENGINEERS AND

More information

Accelerating intelligence at the edge for embedded and IoT applications

Accelerating intelligence at the edge for embedded and IoT applications Accelerating intelligence at the edge for embedded and IoT applications Arm Tech Symposia 2017 Agenda The emergence of intelligence at the edge Requirements for intelligent edge computing IP and technologies

More information

Protecting your system from the scum of the universe

Protecting your system from the scum of the universe Protecting your system from the scum of the universe Gilad Ben-Yossef gilad@benyossef.com Twitter: @giladby About me My name is Gilad Ben-Yossef. I work on applied cryptography and security of the upstream

More information

Beyond TrustZone PSA. Rob Coombs Security Director. Part1 - PSA Tech Seminars Arm Limited

Beyond TrustZone PSA. Rob Coombs Security Director. Part1 - PSA Tech Seminars Arm Limited Beyond TrustZone PSA Rob Coombs Security Director Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security analyses Summary

More information

Building firmware update: The devil is in the details

Building firmware update: The devil is in the details Building firmware update: The devil is in the details Atsushi Haruta, IoT Services Group, Arm Arm Tech Symposia Japan 2017 Arm Mbed: Secure device management Application Cloud Mbed Cloud Secure, scalable,

More information

How to Build Optimized ML Applications with Arm Software

How to Build Optimized ML Applications with Arm Software How to Build Optimized ML Applications with Arm Software Arm Technical Symposia 2018 Arm K.K. Senior FAE Ryuji Tanaka Overview Today we will talk about applied machine learning (ML) on Arm. My aim for

More information

Confessions of a security hardware driver maintainer

Confessions of a security hardware driver maintainer Confessions of a security hardware driver maintainer Gilad Ben-Yossef Principal Software Engineer About me My name is Gilad Ben-Yossef. I work on upstream Linux kernel cryptography and security in genera,l

More information

Implementing debug. and trace access. through functional I/O. Alvin Yang Staff FAE. Arm Tech Symposia Arm Limited

Implementing debug. and trace access. through functional I/O. Alvin Yang Staff FAE. Arm Tech Symposia Arm Limited Implementing debug and trace access through functional I/O Alvin Yang Staff FAE Arm Tech Symposia 2017 Agenda Debug and trace access limitations A new approach Protocol based Bare metal vs mission mode

More information

BUD Status of Android AOSP TV Project. Khasim Syed Mohammed, Tech Lead Linaro Home Group

BUD Status of Android AOSP TV Project. Khasim Syed Mohammed, Tech Lead Linaro Home Group BUD17-118 Status of Android AOSP TV Project Khasim Syed Mohammed, Tech Lead Linaro Home Group Overview ENGINEERS AND DEVICES WORKING TOGETHER What is AOSP TV Project about? Focus and Goals of AOSP TV project

More information

Improve the container image compatibility on Arm

Improve the container image compatibility on Arm Improve the container image compatibility on Arm Wei.Chen@arm.com Penny.Zheng@arm.com Edinburgh, UK / Open Source Summit Europe 2018 2018-10-24 Agenda Background Why image compatibility on Arm is an issue

More information

Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague

Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July 2017 -- IETF 99 th, Prague 2 What do we mean by security? Communication Security Aims

More information

How to Build Optimized ML Applications with Arm Software

How to Build Optimized ML Applications with Arm Software How to Build Optimized ML Applications with Arm Software Arm Technical Symposia 2018 ML Group Overview Today we will talk about applied machine learning (ML) on Arm. My aim for today is to show you just

More information

Hardware- Software Co-design at Arm GPUs

Hardware- Software Co-design at Arm GPUs Hardware- Software Co-design at Arm GPUs Johan Grönqvist MCC 2017 - Uppsala About Arm Arm Mali GPUs: The World s #1 Shipping Graphics Processor 151 Total Mali licenses 21 Mali video and display licenses

More information

Cortex-A75 and Cortex-A55 DynamIQ processors Powering applications from mobile to autonomous driving

Cortex-A75 and Cortex-A55 DynamIQ processors Powering applications from mobile to autonomous driving Cortex-A75 and Cortex- DynamIQ processors Powering applications from mobile to autonomous driving Lionel Belnet Sr. Product Manager Arm Arm Tech Symposia 2017 Agenda Market growth and trends DynamIQ technology

More information

Connect your IoT device: Bluetooth 5, , NB-IoT

Connect your IoT device: Bluetooth 5, , NB-IoT Connect your IoT device: Bluetooth 5, 802.15.4, NB-IoT Prithi Ramakrishnan Arm TechTalk 2017 IoT connectivity technologies Multiple standards, different applications Throughput Unlicensed >100Mbps Wi-Fi

More information

Compute solutions for mass deployment of autonomy

Compute solutions for mass deployment of autonomy Compute solutions for mass deployment of autonomy Rod Watt Director of Vehicle Architecture and System Analysis Introduction 2 From inception to now 1990 Joint venture between Acorn Computers and Apple.

More information

Arm s Latest CPU for Laptop-Class Performance

Arm s Latest CPU for Laptop-Class Performance Arm s Latest CPU for Laptop-Class Performance 2018 Arm Limited Aditya Bedi Arm Tech Symposia India Untethered. Connected. Immersive. Innovation continues to drive growth and performance demands on our

More information

Designing Security & Trust into Connected Devices

Designing Security & Trust into Connected Devices Designing Security & Trust into Connected Devices Rob Coombs Security Marketing Director TechCon 11/10/15 Agenda Introduction Security Foundations on Cortex-M Security Foundations on Cortex-A Use cases

More information

How to protect Automotive systems with ARM Security Architecture

How to protect Automotive systems with ARM Security Architecture How to protect Automotive systems with ARM Security Architecture Thanks to this app You can manoeuvre The new Forpel Using your smartphone! Too bad it s Not my car Successful products will be attacked

More information

Running Android on the Mainline Graphics Stack. Robert

Running Android on the Mainline Graphics Stack. Robert Running Android on the Mainline Graphics Stack Robert Foss @memcpy_io Agenda Android History Android on Mainline Current Status Big Picture Android History Android History Qualcomm diff with mainline,

More information

Arm TrustZone Armv8-M Primer

Arm TrustZone Armv8-M Primer Arm TrustZone Armv8-M Primer Odin Shen Staff FAE Arm Arm Techcon 2017 Security Security technologies review Application Level Security Designed with security in mind: authentication and encryption Privilege

More information

CCIX: a new coherent multichip interconnect for accelerated use cases

CCIX: a new coherent multichip interconnect for accelerated use cases : a new coherent multichip interconnect for accelerated use cases Akira Shimizu Senior Manager, Operator relations Arm 2017 Arm Limited Arm 2017 Interconnects for different scale SoC interconnect. Connectivity

More information

Using Virtual Platforms To Improve Software Verification and Validation Efficiency

Using Virtual Platforms To Improve Software Verification and Validation Efficiency Using Virtual Platforms To Improve Software Verification and Validation Efficiency Odin Shen Staff FAE Arm Arm Tech Symposia Taiwan 2017 Software complexity and best practices Software Costs Increasing

More information

ARM Trusted Firmware Evolution HKG15 February Andrew Thoelke Systems & Software, ARM

ARM Trusted Firmware Evolution HKG15 February Andrew Thoelke Systems & Software, ARM ARM Trusted Evolution HKG15 February 2015 Andrew Thoelke Systems & Software, ARM 1 ARM Trusted for 64-bit ARMv8-A A refresher Standardized EL3 Runtime For all 64-bit ARMv8-A systems Reducing porting and

More information

OP-TEE Using TrustZone to Protect Our Own Secrets

OP-TEE Using TrustZone to Protect Our Own Secrets OP-TEE Using TrustZone to Protect Our Own Secrets ROM-Code Bootloader OP-TEE Kernel Root File System ELC Europe 2017, 23.10.2017 Marc Kleine-Budde Slide 1 - http://www.pengutronix.de

More information

Trustzone Security IP for IoT

Trustzone Security IP for IoT Trustzone Security IP for IoT Udi Maor CryptoCell-7xx product manager Systems & Software Group ARM Tech Forum Singapore July 12 th 2017 Why is getting security right for IoT so important? When our everyday

More information

Tailoring TrustZone as SMM Equivalent

Tailoring TrustZone as SMM Equivalent presented by Tailoring TrustZone as SMM Equivalent Tony C.S. Lo Senior Manager American Megatrends Inc. UEFI Plugfest March 2016 www.uefi.org 1 Agenda Introduction ARM TrustZone SMM-Like Services in TrustZone

More information

Bringing Intelligence to Enterprise Storage Drives

Bringing Intelligence to Enterprise Storage Drives Bringing Intelligence to Enterprise Storage Drives Neil Werdmuller Director Storage Solutions Arm Santa Clara, CA 1 Who am I? 28 years experience in embedded Lead the storage solutions team Work closely

More information

What is gem5 and where do I get it?

What is gem5 and where do I get it? What is gem5 and where do I get it? Andreas Sandberg & Nikos Nikoleris ARM Research Why gem5? Runs real workloads Runs complex workloads like Android & ChromeOS System-level insights Device interactions

More information

Cortex-A75 and Cortex-A55 DynamIQ processors Powering applications from mobile to autonomous driving

Cortex-A75 and Cortex-A55 DynamIQ processors Powering applications from mobile to autonomous driving Cortex-A75 and Cortex-A55 DynamIQ processors Powering applications from mobile to autonomous driving Stefan Rosinger Director, Product Management Arm Arm TechCon 2017 Agenda Market growth and trends DynamIQ

More information

ARM Intelligent Power Allocation

ARM Intelligent Power Allocation ARM Intelligent Power Allocation 1 Agenda Background and Motivation What is ARM Intelligent Power Allocation? Results Status and Conclusions 2 Power Consumption Scenarios The illustration to the right

More information

Advanced IP solutions enabling the autonomous driving revolution

Advanced IP solutions enabling the autonomous driving revolution Advanced IP solutions enabling the autonomous driving revolution Chris Turner Director, Emerging Technology & Strategy, Embedded & Automotive Arm Shanghai, Beijing, Shenzhen Arm Tech Symposia 2017 Agenda

More information

Connect Your IoT Device: Bluetooth 5, , NB-IoT

Connect Your IoT Device: Bluetooth 5, , NB-IoT Connect Your IoT Device: Bluetooth 5, 802.15.4, NB-IoT Craig Tou Business Development Manager, Arm Arm Tech Symposia 2017, Taipei IoT Devices - Everything Connects New classes of connectivity for a new

More information

Smart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017

Smart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017 Smart Antennas and : Enabling Secure Convergence July 5, 2017 About OpenSynergy OpenSynergy develops software solutions for embedded automotive systems. OpenSynergy s product portfolio includes key software

More information

2017 Arm Limited. How to design an IoT SoC and get Arm CPU IP for no upfront license fee

2017 Arm Limited. How to design an IoT SoC and get Arm CPU IP for no upfront license fee 2017 Arm Limited How to design an IoT SoC and get Arm CPU IP for no upfront license fee An enhanced Arm DesignStart Building on a strong foundation Successfully used by 1000s of designers, researchers

More information

SIERRAWARE SIERRATEE FOR MIPS OMNISHIELD

SIERRAWARE SIERRATEE FOR MIPS OMNISHIELD SIERRAWARE SIERRATEE FOR MIPS OMNISHIELD Introduction SierraTEE for MIPS OmniShield is a Global Platform compliant Trusted Execution Environment (TEE) designed for devices based on Imagination Technologies'

More information

Software Ecosystem for Arm-based HPC

Software Ecosystem for Arm-based HPC Software Ecosystem for Arm-based HPC CUG 2018 - Stockholm Florent.Lebeau@arm.com Ecosystem for HPC List of components needed: Linux OS availability Compilers Libraries Job schedulers Debuggers Profilers

More information

Rendering Structures Analyzing modern rendering on mobile

Rendering Structures Analyzing modern rendering on mobile Rendering Structures Analyzing modern rendering on mobile 2018 Arm Limited Hans-Kristian Arntzen 2018-08-16 SIGGRAPH 2018 Content 1 2 3 4 5 Motivation Scene and lights Rendering structures overview Benchmark

More information

Designing Security & Trust into Connected Devices

Designing Security & Trust into Connected Devices Designing Security & Trust into Connected Devices Eric Wang Senior Technical Marketing Manager Shenzhen / ARM Tech Forum / The Ritz-Carlton June 14, 2016 Agenda Introduction Security Foundations on Cortex-A

More information

Modern security for microcontrollers

Modern security for microcontrollers The challenge of scaling IoT Modern security for microcontrollers Gaining user-trust & keeping it Milosch Meriac Principal Security Research Lead milosch.meriac@arm.com About me & my projects Principal

More information

How Can You Trust Formally Verified Software?

How Can You Trust Formally Verified Software? How Can You Trust Formally Verified Software? Alastair Reid Arm Research @alastair_d_reid Formal verification Of libraries and apps Of compilers Of operating systems 2 Fonseca et al., An Empirical Study

More information

Arm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited

Arm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited Arm Mbed Edge Shiv Ramamurthi Arm Arm Tech Symposia 2017 IoT increasing efficiency, yield, and convenience Commercial buildings Better energy & space utilization Precision farming and connected sites Increased

More information

Lecture 3 MOBILE PLATFORM SECURITY

Lecture 3 MOBILE PLATFORM SECURITY Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common

More information

How Can You Trust Formally Verified Software?

How Can You Trust Formally Verified Software? How Can You Trust Formally Verified Software? Alastair Reid Arm Research @alastair_d_reid Buffer over-read vulnerabilities Use after free s e i t i l i b a r e n l u v r o r r e c Logi Buffer overflow

More information

Designing Security & Trust into Connected Devices

Designing Security & Trust into Connected Devices Designing Security & Trust into Connected Devices Eric Wang Sr. Technical Marketing Manager Tech Symposia China 2015 November 2015 Agenda Introduction Security Foundations on ARM Cortex -M Security Foundations

More information

Security and Performance Benefits of Virtualization

Security and Performance Benefits of Virtualization Security and Performance Benefits of Virtualization Felix Baum mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered

More information

Profiling and Debugging OpenCL Applications with ARM Development Tools. October 2014

Profiling and Debugging OpenCL Applications with ARM Development Tools. October 2014 Profiling and Debugging OpenCL Applications with ARM Development Tools October 2014 1 Agenda 1. Introduction to GPU Compute 2. ARM Development Solutions 3. Mali GPU Architecture 4. Using ARM DS-5 Streamline

More information

DynamIQ Processor Designs Using Cortex-A75 & Cortex-A55 for 5G Networks

DynamIQ Processor Designs Using Cortex-A75 & Cortex-A55 for 5G Networks DynamIQ Processor Designs Using Cortex-A75 & Cortex-A55 for 5G Networks Jeff Maguire Senior Product Manager Infrastructure IP Product Management Arm 2017 Arm Limited Arm Tech Symposia 2017 Agenda 5G networks

More information

Embedded System Security Mobile Hardware Platform Security

Embedded System Security Mobile Hardware Platform Security 1 Embedded System Security Mobile Hardware Platform Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Summer Term 2017 Acknowledgement This slide set

More information

Advanced Software Features for the LA-950

Advanced Software Features for the LA-950 Advanced Software Features for the LA-950 Ian Treviranus ian.treviranus@horiba.com www.horiba.com/us/particle What we ll talk about Measurement tools Data analysis tools Data verification tools Q&A One-button

More information

Embedded System Security Mobile Hardware Platform Security

Embedded System Security Mobile Hardware Platform Security 1 Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Summer Term 2016 Acknowledgement This slide set is based on slides provided by

More information

DynamIQ Processor Designs Using Cortex-A75 & Cortex- A55 for 5G Networks

DynamIQ Processor Designs Using Cortex-A75 & Cortex- A55 for 5G Networks DynamIQ Processor Designs Using Cortex-A75 & Cortex- A55 for 5G Networks 2017 Arm Limited David Koenen Sr. Product Manager, Arm Arm Tech Symposia 2017, Taipei Agenda 5G networks Ecosystem software to support

More information

How Can You Trust Formally Verified Software?

How Can You Trust Formally Verified Software? How Can You Trust Formally Verified Software? Alastair Reid Arm Research @alastair_d_reid https://www.theguardian.com/business/2015/may/01/us-aviation-authority-boeing-787-dreamliner-bug-could-cause-loss-of-control

More information

ARM Multimedia IP: working together to drive down system power and bandwidth

ARM Multimedia IP: working together to drive down system power and bandwidth ARM Multimedia IP: working together to drive down system power and bandwidth Speaker: Robert Kong ARM China FAE Author: Sean Ellis ARM Architect 1 Agenda System power overview Bandwidth, bandwidth, bandwidth!

More information

Porting Tizen-IVI 3.0 to an ARM based SoC Platform

Porting Tizen-IVI 3.0 to an ARM based SoC Platform Porting Tizen-IVI 3.0 to an ARM based SoC Platform Damian Hobson-Garcia Automotive Linux Summit July 1-2, 2014 Tokyo, Japan Tizen IVI support Until recently Intel architecture (x86) system Tizen IVI 2.0alpha,

More information

96Boards - TV Platform

96Boards - TV Platform 96Boards - TV Platform Presented by Mark Gregotski Developing the Specification Date BKK16-303 March 9, 2016 Event Linaro Connect BKK16 Overview Motivation for a TV Platform Specification Comparison with

More information

Arm crossplatform. VI-HPS platform October 16, Arm Limited

Arm crossplatform. VI-HPS platform October 16, Arm Limited Arm crossplatform tools VI-HPS platform October 16, 2018 An introduction to Arm Arm is the world's leading semiconductor intellectual property supplier We license to over 350 partners: present in 95% of

More information

Optimizing ARM SoC s with Carbon Performance Analysis Kits. ARM Technical Symposia, Fall 2014 Andy Ladd

Optimizing ARM SoC s with Carbon Performance Analysis Kits. ARM Technical Symposia, Fall 2014 Andy Ladd Optimizing ARM SoC s with Carbon Performance Analysis Kits ARM Technical Symposia, Fall 2014 Andy Ladd Evolving System Requirements Processor Advances big.little Multicore Unicore DSP Cortex -R7 Block

More information

Deep Learning on Arm Cortex-M Microcontrollers. Rod Crawford Director Software Technologies, Arm

Deep Learning on Arm Cortex-M Microcontrollers. Rod Crawford Director Software Technologies, Arm Deep Learning on Arm Cortex-M Microcontrollers Rod Crawford Director Software Technologies, Arm What is Machine Learning (ML)? Artificial Intelligence Machine Learning Deep Learning Neural Networks Additional

More information

Mobile & IoT Market Trends and Memory Requirements

Mobile & IoT Market Trends and Memory Requirements Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Daniel Heo ARM Segment Marketing Copyright ARM 2016 Outline Wearable & IoT Market Opportunities Challenges in Wearables & IoT

More information

ARM Trusted Firmware From Embedded to Enterprise. Dan Handley

ARM Trusted Firmware From Embedded to Enterprise. Dan Handley ARM Trusted Firmware From Embedded to Enterprise Dan Handley Agenda Quick recap Project news Security hardening AArch32 support ENGINEERS AND DEVICES WORKING TOGETHER Other enhancements Translation table

More information

HKG Overview of Integrating OP-TEE into HiKey620 AOSP Builds. Victor Chong

HKG Overview of Integrating OP-TEE into HiKey620 AOSP Builds. Victor Chong HKG18-119 Overview of Integrating OP-TEE into HiKey620 AOSP Builds Victor Chong Agenda First things first Local manifests Patches Custom CA/TA Calling CA/TA from AOSP Improvements First things first -

More information

џ џ џ џ џ џ џ џ џ џ џ џ .976 REAL CINEMA

џ џ џ џ џ џ џ џ џ џ џ џ .976 REAL CINEMA PRO 4K Dune HD Pro 4K is a premium compact 4Kp60 HDR media player and Smart TV box with Hi-End video quality, HD audio support, BD3D support, unique hybrid Linux + Android 7.1 software, automatic conversion

More information

Operating system hardening

Operating system hardening Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications

More information

HW isolation for automotive environment BoF

HW isolation for automotive environment BoF HW isolation for automotive environment BoF Michele Paolino m.paolino@virtualopensystems.com AGL All Member Meeting 2016, 2016-09-07, Munich, Germany http://www.tapps-project.eu/ Authorship and sponsorship

More information

Supplier Training Visual Guide

Supplier Training Visual Guide Supplier Training Visual Guide Course Agenda Log in as a Supplier RFx Response 2 Course Objectives Learn to respond to a RFx and access the contract agreements. 3 Here are some key terms you ll want to

More information

Presentation's title

Presentation's title 3 rd April 2017 B03 -In-vehicle technology enabler Presentation's title Dominique Bolignano CEO Prove & Run dominique.bolignano@provenrun.com Introducing myself and Prove & Run Dominique Bolignano, previously

More information

Secure storage in OP-TEE. Jens Wiklander

Secure storage in OP-TEE. Jens Wiklander Secure storage in OP-TEE Jens Wiklander ENGINEERS AND DEVICES WORKING TOGETHER Agenda What is secure storage? Timeline - secure storage improvements Encryption keys Secure Object Hash tree Hash tree header

More information

Making progress vs strategy

Making progress vs strategy Making progress vs strategy Ian Thornton, Head of Investor Relations Arm is a subsidiary of 1 Arm update Arm refresher H1 update Increasing revenues and investments Progress vs strategy Arm in servers

More information

The Work of Containerized NFV Infrastructure on Arm Platform

The Work of Containerized NFV Infrastructure on Arm Platform The Work of Containerized NFV Infrastructure on Arm Platform Trevor Tao Tokyo 2018-06-21 Agenda Background Data Plane Acceleration on Arm Advanced CNI plugins and Use Case for Container

More information

WPE WebKit. HTML5 user interfaces for embedded devices. Juan José Sánchez Penas Embedded Linux Conference Prague, October 2017

WPE WebKit. HTML5 user interfaces for embedded devices. Juan José Sánchez Penas Embedded Linux Conference Prague, October 2017 WPE WebKit HTML5 user interfaces for embedded devices Juan José Sánchez Penas Embedded Linux Conference Prague, October 2017 Myself, Igalia and Web Browsers Co-founder of Igalia in 2001. 60 engineers.

More information

Porting Tizen-IVI 3.0 to an ARM based SoC Platform. Damian Hobson-Garcia, IGEL Co., Ltd.

Porting Tizen-IVI 3.0 to an ARM based SoC Platform. Damian Hobson-Garcia, IGEL Co., Ltd. Porting Tizen-IVI 3.0 to an ARM based SoC Platform Damian Hobson-Garcia, IGEL Co., Ltd. Current State of Affairs Intel architecture (x86) system Tizen IVI 2.0alpha, Tizen IVI 3.0 ARM architecture based

More information

Arm Mbed Edge. Nick Zhou Senior Technical Account Manager. Arm Tech Symposia Arm Limited

Arm Mbed Edge. Nick Zhou Senior Technical Account Manager. Arm Tech Symposia Arm Limited Arm Mbed Edge Nick Zhou Senior Technical Account Manager Arm Tech Symposia 2017 IoT increasing efficiency, yield, and convenience Commercial buildings Better energy & space utilization Precision farming

More information

UEFI updates, Secure firmware and Secure Services on Arm

UEFI updates, Secure firmware and Secure Services on Arm presented by UEFI updates, Secure firmware and Secure Services on Arm Spring 2018 UEFI Seminar and Plugfest March 26-30, 2018 Presented by Dong Wei & Matteo Carlini (Arm) Agenda UEFI and SBBR/EBBR Updates

More information

Mobile & IoT Market Trends and Memory Requirements

Mobile & IoT Market Trends and Memory Requirements Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Copyright 2016 [ARM Inc.] Outline Wearable & IoT Market Opportunity Challenges in Wearables & IoT Market ARM technology tackles

More information

Securing the System with TrustZone Ready Program Securing your Digital World. Secure Services Division

Securing the System with TrustZone Ready Program Securing your Digital World. Secure Services Division Securing the System with TrustZone Ready Program Securing your Digital World Secure Services Division 1 ARM Secure Services Division Established in Q4 2010 To enable a market for secure applications and

More information

How to run applications on Aziz supercomputer. Mohammad Rafi System Administrator Fujitsu Technology Solutions

How to run applications on Aziz supercomputer. Mohammad Rafi System Administrator Fujitsu Technology Solutions How to run applications on Aziz supercomputer Mohammad Rafi System Administrator Fujitsu Technology Solutions Agenda Overview Compute Nodes Storage Infrastructure Servers Cluster Stack Environment Modules

More information

Xen Automotive Hypervisor Automotive Linux Summit 1-2 July, Tokyo

Xen Automotive Hypervisor Automotive Linux Summit 1-2 July, Tokyo Xen Automotive Hypervisor Automotive Linux Summit 1-2 July, Tokyo 2014 GlobalLogic Inc. Vehicles are Changing Vehicle became the ultimate mobile device and we, the people, are becoming connected drivers

More information

Machine learning for the Internet of Things

Machine learning for the Internet of Things Machine learning for the Internet of Things Chris Shore Director of Embedded Solutions Arm 2018 Arm Limited April 2018 More Intelligence at the Edge Arm Cortex-M Expanding opportunity for the embedded

More information

Dynamic secure firmware configuration. Dan Handley (Arm)

Dynamic secure firmware configuration. Dan Handley (Arm) Dynamic secure firmware configuration Dan Handley (Arm) Recap BUD17 had a session to discuss possible secure world use of kernel Device Tree (DT) Like the kernel, it s desirable to have a single set of

More information

Smart TV Security Solution V2.0 for Samsung Knox. Certification Report

Smart TV Security Solution V2.0 for Samsung Knox. Certification Report KECS-CR-17-82 Smart TV Security Solution V2.0 for Samsung Knox Certification Report Certification No.: KECS-CISS-0846-2017 2017. 12. 27 IT Security Certification Center History of Creation and Revision

More information

Diversity of. connectivity required for scalable IoT devices. Sam Grove Principal Software Engineer Arm. Arm TechCon 2017.

Diversity of. connectivity required for scalable IoT devices. Sam Grove Principal Software Engineer Arm. Arm TechCon 2017. Diversity of connectivity required for scalable IoT devices Sam Grove Principal Software Engineer Arm Arm TechCon 2017 Introduction Mbed introduction Mbed Cloud Connect Addressing the complexity of reliably

More information

ARM Trusted Firmware ARM UEFI SCT update

ARM Trusted Firmware ARM UEFI SCT update presented by ARM Trusted Firmware ARM UEFI SCT update UEFI US Fall Plugfest September 20-22, 2016 Presented by Charles García-Tobin (ARM) Updated 2011-06-01 Agenda ARM Trusted Firmware What and why UEFI

More information

Bringing display and 3D to the C.H.I.P computer

Bringing display and 3D to the C.H.I.P computer Embedded Linux Conference 2016 Bringing display and 3D to the C.H.I.P computer Maxime Ripard maxime@bootlin.com Copyright 2004-2018, Bootlin. Creative Commons BY-SA 3.0 license. embedded Linux and kernel

More information

Lecture Secure, Trusted and Trustworthy Computing Mobile Hardware Platform Security

Lecture Secure, Trusted and Trustworthy Computing Mobile Hardware Platform Security 1 Lecture Secure, Trusted and Trustworthy Computing Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Winter Term 2015/2016 Overview General model for

More information