The Internet of Things is bringing forth new security challenges that need to be addressed before deployment reaches a larger scale. In this webinar video, we show you how you can utilize built-in Hardware Security features like Arm® TrustZone and High Assurance boot in a simpler way.
Prove & Run will show how you can add high security features to an otherwise unprotected Linux Operating System. We demonstrate this in the case of adding a secure firewall, open VPN, and secure firmware update capabilities. We also briefly explain the security rationale. This involves reducing the scope of the Trusted Computing Base, which can be achieved using a combination of ready-to-use formally proven, secure, and certification COTS. By combining these basic security bricks, one can secure virtually any IoT architecture at a very high level of security with marginal and acceptable costs.
We further demonstrate solutions on a Colibri iMX7 System on Module, unitizing Arm TrustZone and the high assurance boot inside NXP®'s i.MX 7 SoC.
- Utilize Arm TrustZone in a simpler way
- Understand ways to isolate secure and non-secure software
- See it implemented on a Firmware update, VPN, and Firewall