Many systems deployed today run applications that are requiring more stringent security for regulatory compliance or best practices. Devices connected to the cloud or internet are often accessing and storing sensitive data that is vulnerable to attacks, thus an approach to properly design and implement a security strategy is critical. In this session learn how a root of trust can be designed into SoCs.
In this session, attendees will learn a pragmatic approach to configuring a heterogeneous multicore ARM® device built with ARM TrustZone™ technology and trade-offs of various implementations. Attendees will step through the process of configuring a multicore device to balance both real-time demands against requirements to incorporate open-source software, along with steps to ensure sensitive data is secure and the design is robust.