Innovation is Thriving in Semiconductors Mike Muller Chief Technology Officer ARM TechCon Nov 10, 2015
BBC Model B ARM1 ARM Holdings Cortex-M0 BBC micro:bit 1981 1985 1990 2015 Core Tech Transisto r Design ARM1 3000n m 25k 6My Cortex-M0 20nm 48k 11My
Moore's Law for imprinting 1000 100 Cortex-A5 Blu-ray kgates /cm 2 10 1 Cortex-M0 5 5 4LM 2LM 2 4LM 2014 2015 2016 2018 2020 2022 DVD CD
Sensors to smartphones to servers
Sensors to smartphones to servers
ARM servers available from multiple manufacturers HP ProLiant (Applied Micro, TI) Softiron 64-0800 (AMD) Gigabyte R120-P30 (Applied Micro) Wiwynn LN1148-10SL (Marvell) Gigabyte MT70-HD0 (Cavium) Cirrascale RM1905D (Applied Micro) Mitac Datun (Applied Micro) Gigabyte D120-S3G (Annapurna)
Arm.com now runs on ARM-based Servers
More than just servers Cavium Cloud RAN
Beyond servers Barcelona Super computing Center Sandia Labs HPC US DOE FastForward HPC
Sensors to smartphones to servers
How Mobile-first is changing the world Social Education Health Banking Images courtesy of Humanitarian Centre
Number of mobile devices shipped Investing in mobile computing 2.8bn smartphones tablets laptops 0.4bn 1.9bn 1.4B 2.2B >1bn Entry level 2009 2014 2020 Source: Gartner and ARM data >85% >85% In 2014 were ARM based >50% In 2015 will be ARMv8A
Introducing the Cortex-A35 processor ARM s Most Efficient 64bit Apps Processor Lower power Improved performance Scalable and versatile 10% Lower power and at the same time.. 6% to 40% performance uplift Configurable for multiple applications All figures iso-process relative to Cortex-A7 on 28nm
Relative total power Cortex-A35: Scalable & lowest power 1.00 Cortex-A35 Power Optimizations on 28nm 1.0 GHz Less than 90mW at 1.0 GHz 0.80 0.60 0.40 15 x 0.20 100 MHz 0.00 Performance Optimized Typical core configuration Very low power Optimized Smallest core Less than 6mW at 100 MHz
Cortex-A35: Configurable features and size CPU0 CPU1 +10x smaller CPU3 CPU2 < 0.4 mm 2 28nm Cortex-A35 Quad core configuration 32K L1 caches, NEON, Crypto, 1MB L2 cache Cortex-A35 Smallest configuration Single core, 8K L1 caches, no L2 Configurable for applications ranging from mobile to deeply embedded
Investing in mobile: Processors and Physical IP big Cortex-A15 Cortex-A17 Cortex-A57 Cortex-A72 Artemis Future big Processors LITTLE Cortex-A7 Cortex-A53 Cortex-A35 Future LITTLE Processors Graphics Mali-4xx Mali-T6xx Mali-T7xx Mali-T830 Mali-T880 Mimir Future Graphics IP Video Mali-V500 Mali-V550 Egil Future Video IP Display Mali-D500 Mali-D550 Gemini Future Display Technology Systems IP Corelink CCI-400 Corelink CCI-500 CCI-550 Future System IP Physical IP 32nm 32 / 28nm 28nm 20nm 16 / 14FF 10nm Future Physical IP
Ongoing opportunity for future innovation Multiple touch points Devices that conform to and learn your needs Fully contextually aware Right compute for all the tasks Natural language Inputs Advanced machine learning
Sensors to smartphones to servers
This years favourite product Energy harvesting BLE insulin pen 400μJ energy from lid removal Cortex-M0 based
What s changed? 1981 1985 1990 2015 Attack Security architecture Attack Attack Attack Attack
ARM Global Engineering Conference
Stop people eavesdropping Phon e Emulator App Certificate Authority Serve r Certificate
The man-in-the-middle attack Emulator App Hacker Certificate Authority Clear text SSL interceptor Certificate Certificate Serve r
Mistake: No certificate pinning Certificate pinning Pin the authority you trust not the device Only one extra function call Emulator App Hacker Certificate Authority Clear text SSL interceptor Certificate Certificate Serve r
Login/Identity OAUTH Need to log in to create new messages Use App.Key to sign password Server uses App.Key to verify password Clear text Emulator App Shared App.key SSL interceptor Serve r Shared App.key
Provisioning Apps store App package App.code Shared App.key Clear text Emulator App Shared App.key SSL interceptor Serve r Shared App.key
Mistake: Weak provisioning Apps store App package App.code Shared App.key New message Secure provisioning is hard There were other mistakes API text not encrypted Message replay Weak initial password/pin Password not hashed and salted Password reset without confirmation Emulator App Shared App.key SSL interceptor Serve r Shared App.key
How a hacker thinks Post Win points Repeat Delete message? Post Win points Delete Repeat David Lightman
Now we need to enable secure < $1 microcontroller designs done by people with absolutely no security experience 29 Confidential
Security from Silicon to the Cloud Lifecycle Security Communication Security Encryption, Authentication, OTA updates Device Integrity Secure Identity, Software Identity, Isolation, Tamper Detection
ARMv8-M architecture The new ARM architecture for ARM Cortex-M processors ARM Cortex-M Radio MCU Sensor Physical IP Secure Store Crypto Multi-year battery life
ARMv8-M architecture The ARM architecture for ARM Cortex-M processors Provides a security foundation with TrustZone
Authentication Mobile Payment Content Protection Enterprise Security
TrustZone for ARMv8-M TrustZone for ARMv8-A NORMAL WORLD Non Secure App SECURE WORLD Secure App TrustZone for ARMv8- M NORMAL WORLD Non Secure App SECURE WORLD Secure App/Libs Rich OS. e.g. Linux Secure OS Non Secure RTOS Secure RTOS Secure Monitor TrustZone Applications Processors ARMv8-M Microcontroller
ARMv8-M: Security in Small, Real-time Embedded Optimized for small real-time processors Hardware based security state switch Fully programmable in C Transparent to the software developer Low, deterministic interrupt latency Efficient every cycle counts No hypervisor code and processing overhead Easy to program easy to debug Transition via a standard function call
Enhanced Security with TrustZone CryptoCell Code validation and protection Key provisioning and management Secure storage of sensitive assets Secure debug and test Security resources CryptoCell Asymmetric Crypto Symmetric Crypto CryptoCell-700 series for Cortex-A CryptoCell-300 series for Cortex-M ARM Cortex-M MCU Radio Sensor Secure Store Crypto Physical IP
mbed OS 3.0 mbed OS Core Application Code Communication Management Device Management Schedulers Energy Event Tasks mbed OS API IP Stack Libraries mbed Client mbed TLS BLE API Thread API Secure communications mbed OS Drivers WiFi CMSIS-Core 6LoWPAN Thread Debug Support BLE Device Drivers mbed OS uvisor Secure Drivers SW Crypto uvisor Lifecycle Security Secure Lifecycle ARM Cortex-M Hardware Interfaces Radio MCU Sensor Secure Store Crypto Secure Devices Physical IP
Device Server mbed Clients mbed OS and TrustZone
mbed Connector Services available now for developers 39 Confidential
A web based development environment mbed app mbed OS mbed Connector Cloud Application Device s Provisioning authenticating Devices with and without screen Secure, middleware for management Choice of cloud analytics platforms
Re-distribution of Trust is key for IoT Device Onboarding Easy intuitive self-install and registration Device Configuration Match configurations to service subscriptions Analytics Service experience analytics Remote Connectivity Apps with secure, realtime remote access Device Updates Real-time visibility into the status of all connected devices Firmware Updates Policy driven firmware manager
Trust Foundation for IoT ARM mbed IoT Device Platform builds the trust foundations that enable device and trusted cloud services to scale Device Services Applications Software Device Connectivity Device Provisioning Analytics Storage Silicon Architecture Device Update Communications
Security Foundation for IoT Lifecycle Security mbed Device Server mbed Connector Communication Security Encryption, Authentication, OTA updates mbed TLS, TrustZone CryptoCell Device Integrity Secure Identity, Software Identity, Isolation, Tamper Detection TrustZone, mbed OS, TrustZone CryptoCell, SecurCore
Reaching millions of developers 1990s 10,000s First ARM MCU 2000s 100,000s Cortex-A MPUs Cortex-M MCUs 2010s 1,000,000s Accessible platforms, APIs Cloud & mobile developers IoT developers emerge
Sensors to smartphones to servers
Opportunities everywhere Networking Medical Industrial Intelligent Home Robotics Automotive Agriculture HPC Building Automation Wearables Consumer Space Smart Grid Retail Gaming Education Mobile VR/AR
What s changed? Personal Computing Mobile computing Internet of Things Perf $ Perf Power $ Perf Energy $
Performance Energy x $ x trust x scale = succes s 48 Confidential