Skip to content

ARM processors and SoC architectures are well known and widely used in embedded systems. However implementing security measures to make components and systems more secure is a must have for new products. Examples to think about are secure boot, secure update, secure debug, or isolate applications and data.

Our services

  • Analyzing of current ARM SoC architecture  
  • Conducting security risk assessment of the product
  • Execute threat modeling and security analyses 
  • Develop security concepts for the SoC
  • Support utilizing ARM Trustzone, secure debug, secure boot, software isolation, or Trusted Firmware-M
  • Support preparation for conformity assessment procedures to get your product certified for EU CRA or similar