ARM SoC Security
ARM processors and SoC architectures are well known and widely used in embedded systems. However implementing security measures to make components and systems more secure is a must have for new products. Examples to think about are secure boot, secure update, secure debug, or isolate applications and data.
Our services
- Analyzing of current ARM SoC architecture
- Conducting security risk assessment of the product
- Execute threat modeling and security analyses
- Develop security concepts for the SoC
- Support utilizing ARM Trustzone, secure debug, secure boot, software isolation, or Trusted Firmware-M
- Support preparation for conformity assessment procedures to get your product certified for EU CRA or similar