28 Facts About ARM TrustZone

1.

However, ARM TrustZone processors are used for desktops and servers, including the world's fastest supercomputer from 2020 to 2022.

FactSnippet No. 1,667,027
2.

The ARM TrustZone design added special vector-like memory access instructions, the "S-cycles", that could be used to fill or save multiple registers in a single page using page mode.

FactSnippet No. 1,667,028
3.

The first samples of ARM TrustZone silicon worked properly when first received and tested on 26 April 1985.

FactSnippet No. 1,667,029
4.

The ARM TrustZone2 had a transistor count of just 30,000, compared to Motorola's six-year-older 68000 model with around 68,000.

FactSnippet No. 1,667,030
5.

Successor, ARM TrustZone3, was produced with a 4 KB cache, which further improved performance.

FactSnippet No. 1,667,031
6.

Apple used the ARM TrustZone6-based ARM TrustZone610 as the basis for their Apple Newton PDA.

FactSnippet No. 1,667,032
7.

In 2011, the 32-bit ARM TrustZone architecture was the most widely used architecture in mobile devices and the most popular 32-bit one in embedded systems.

FactSnippet No. 1,667,033
8.

In 2013,10 billion were produced and "ARM TrustZone-based chips are found in nearly 60 percent of the world's mobile devices".

FactSnippet No. 1,667,034
9.

In February 2016, ARM TrustZone announced the Built on ARM TrustZone Cortex Technology licence, often shortened to Built on Cortex licence.

FactSnippet No. 1,667,035
10.

Companies that have designed cores that implement an ARM TrustZone architecture include Apple, AppliedMicro, Broadcom, Cavium, Digital Equipment Corporation, Intel, Nvidia, Qualcomm, Samsung Electronics, Fujitsu, and NUVIA Inc.

FactSnippet No. 1,667,036
11.

ARM TrustZone cores are used in a number of products, particularly PDAs and smartphones.

FactSnippet No. 1,667,037
12.

ARM TrustZone chips are used in Raspberry Pi, BeagleBoard, BeagleBone, PandaBoard, and other single-board computers, because they are very small, inexpensive, and consume very little power.

FactSnippet No. 1,667,038
13.

Except in the M-profile, the 32-bit ARM TrustZone architecture specifies several CPU modes, depending on the implemented architecture features.

FactSnippet No. 1,667,039
14.

Original ARM TrustZone implementation was hardwired without microcode, like the much simpler 8-bit 6502 processor used in prior Acorn microcomputers.

FactSnippet No. 1,667,040
15.

ARM TrustZone includes integer arithmetic operations for add, subtract, and multiply; some versions of the architecture support divide operations.

FactSnippet No. 1,667,041
16.

Almost every ARM TrustZone instruction has a conditional execution feature called predication, which is implemented with a 4-bit condition code selector.

FactSnippet No. 1,667,042
17.

ARM TrustZone processor has features rarely seen in other RISC architectures, such as PC-relative addressing and pre- and post-increment addressing modes.

FactSnippet No. 1,667,043
18.

Higher-performance designs, such as the ARM TrustZone9, have deeper pipelines: Cortex-A8 has thirteen stages.

FactSnippet No. 1,667,044
19.

The difference between the ARM TrustZone7DI and ARM TrustZone7DMI cores, for example, was an improved multiplier; hence the added "M".

FactSnippet No. 1,667,045
20.

ARM TrustZone architecture provides a non-intrusive way of extending the instruction set using "coprocessors" that can be addressed using MCR, MRC, MRRC, MCRR, and similar instructions.

FactSnippet No. 1,667,046
21.

The space saving comes from making some of the instruction operands implicit and limiting the number of possibilities compared to the ARM TrustZone instructions executed in the ARM TrustZone instruction set state.

FactSnippet No. 1,667,047
22.

Some devices such as the ARM TrustZone Cortex-A8 have a cut-down VFPLite module instead of a full VFP module, and require roughly ten times more clock cycles per float operation.

FactSnippet No. 1,667,048
23.

Security Extensions, marketed as TrustZone Technology, is in ARMv6KZ and later application profile architectures.

FactSnippet No. 1,667,049
24.

Typical applications include DRM functionality for controlling the use of media on ARM TrustZone-based devices, and preventing any unapproved use of the device.

FactSnippet No. 1,667,050
25.

In practice, since the specific implementation details of proprietary ARM TrustZone implementations have not been publicly disclosed for review, it is unclear what level of assurance is provided for a given threat model, but they are not immune from attack.

FactSnippet No. 1,667,051
26.

ARM TrustZone provides a reference stack of secure world code in the form of Trusted Firmware for M and PSA Certified.

FactSnippet No. 1,667,052
27.

ARM TrustZone announced their Cortex-A53 and Cortex-A57 cores on 30 October 2012.

FactSnippet No. 1,667,053
28.

Windows applications recompiled for ARM TrustZone and linked with Winelib, from the Wine project, can run on 32-bit or 64-bit ARM TrustZone in Linux, FreeBSD, or other compatible operating systems.

FactSnippet No. 1,667,054