Research Links

i.MX Trust Features

Trusted Execution

  •  Isolates execution of critical SW from possible malware
  •  TrustZone Secure & Normal Worlds (processor modes)
  • Hardware firewalls between CPU & DMA masters and memory & peripherals

High Assurance Boot

  • Authenticated boot: prevents unauthorized SW execution
  •  Encrypted boot: protects SW confidentiality 
  • Digital signature checks embedded in on-chip boot ROM
  •  Run every time processor is reset

HW Cryptographic Accelerators

  •  i.MX family dependent
  •  Symmetric: AES-128, AES-256, 3DES, ARC4
  •  Message Digest & HMAC: SHA-1, SHA-256, MD-5

Secure Storage

  •  Protects data confidentiality and integrity 
  • Off-chip: cryptographic protection including device binding
  •  On-chip: self-clearing Secure RAM • HW-only keys: no SW access

HW Random Number Generation

  • Ensures strong keys and protects against protocol replay
  • On-chip entropy generation
  •  Cryptographically secure deterministic RNG

Secure Clock

  • Provides reliable time source
  •  On-chip, separately-powered real-time clock
  • Protection from SW tampering
Categories: ComputingHacking

0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *