|
|
www.design-reuse-embedded.com |
New security technologies for connected embedded devices
By Alexandru Voica - Imagination Blog, Jul. 29, 2015 –
Virtualization, security and trusted execution environments are all trending topics in the new age of ubiquitous connectivity. However, there is a lot of confusion over how these technologies work together and their role in the overall mobile and embedded computing ecosystem.
Luckily, Mike Borza, CTO of the Synopsys-owned Elliptic Technologies has published an extremely insightful whitepaper that clarifies how secure virtualization works in the context of trusted execution environments (TEEs).
Secure virtualization
Virtualization is not only a big part of data centers and enterprise networking, but it is also becoming an important requirement for mobile devices and IoT nodes. Consumer electronics, automotive and IoT markets all look to virtualization for a straightforward way to provide secure separation of resources from each other.
Most of these markets use all-in-one chips (SoCs) which integrate several multicore processors (CPUs, GPUs, VPUs, ISPs, DSPs, RPUs etc.). This approach to system design means that virtualization must be implemented throughout the entire SoC architecture to ensure secure separation between all on-chip components; the author calls this concept secure virtualization.
Click here to read more...