Show simple item record

dc.contributor.advisorSaqib, Fareena
dc.contributor.authorLee, Chia-Che
dc.date.accessioned2017-04-11T14:39:57Z
dc.date.available2017-04-11T14:39:57Z
dc.date.issued2016-11
dc.identifier.urihttp://hdl.handle.net/11141/1315
dc.descriptionThesis (M.S.) - Florida Institute of Technology, 2016en_US
dc.description.abstractWith the huge impact of IoT devices, the security needs are becoming more important than what it had before. Since embedded systems have limited resources, the traditional security solutions are not quite fitting to IoTs because the huge power consumption and resource. ARM TrustZone Technology is a hardware based security feature using in ARM-based devices with minimum resource taken. TrustZone provides a critical environment to isolate security and non-security tasks within Normal and Security World. Both worlds can be a General Purpose Operating System (GPOS) or a Real-Time Operating System (RTOS) depending on designer has needs, and running simultaneously on the same processor. In general, cases, Normal world will be GPOS such as Linux, Android or iOS, and Secure World will be RTOS, because of the security tasks normally is “Time Critical”. In addition, a Secure Monitor handles the communication between Normal World and Secure World. Secure Monitor provides a set of Application Program Interface (API) as Secure Monitor Call (SMC) to provide secure functionalities for both worlds. The SMC runs the corresponding instructions to control Advanced eXtensible Interface (AXI) interconnects with the hardware security settings. This paper demonstrates an ARM Trustzone firmware implementing on Xilinx Zynq-7000 SoC, which is a tight integration of ARM processor (Processor System, PS) and Programmable Logic (PL). In addition, the paper is going to explaining details of TrustZone hardware configurations base on SAFE G, an open source TrustZone platform. The goal is analysis ARM TrustZone technology and programming a DEMO application. In this demonstration, I implemented a custom IP as PL to test the correction of functions of TrustZone, and an AES encryption as an example application to run on the system.en_US
dc.format.mimetypeapplication/pdf
dc.language.isoen_USen_US
dc.rightsCC BY 4.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/legalcodeen_US
dc.titleAES Encryption Algorithm using ARM TrustZone Technologyen_US
dc.typeThesisen_US
dc.date.updated2016-12-05T16:18:17Z
thesis.degree.nameMaster of Science In Computer Engineeringen_US
thesis.degree.levelMastersen_US
thesis.degree.disciplineComputer Engineeringen_US
thesis.degree.departmentElectrical and Computer Engineeringen_US
thesis.degree.grantorFlorida Institute of Technologyen_US
dc.type.materialtext


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY 4.0
Except where otherwise noted, this item's license is described as CC BY 4.0