Please fill in the form below, so we can support you in your request.
Please fill in the form below, so we can support you in your request.


    ASICAMD (Xilinx)AchronixIntel (Altera)LatticeMicrochip (MicroSemi)Other

    By submitting this form you are consenting to being contacted by the MLE via email and receiving marketing information.

    X
    CONTACT MLE
    CONTACT MLE
    We are glad that you preferred to contact us. Please fill our short form and one of our friendly team members will contact you back.


      ASICAMD (Xilinx)AchronixIntel (Altera)LatticeMicrochip (MicroSemi)Other

      By submitting this form you are consenting to being contacted by the MLE via email and receiving marketing information.

      X
      CONTACT MLE

      Security / Trusted Execution Environment and Functional Safety with Zync Ultrascale+ MPSoC / RFSoC

      Presentation at the Workshop Programmable Processing for the Autonomous / Connected Vehicle 2019 in Neu-Ulm

      The security of Embedded Systems has become a key concern, especially when hacked or tampered systems create safety issues and can harm people. In order to make an embedded system secure, CPU vendors like ARM offer the TrustZone technology. On top of this ARM TrustZone technology sits Open Portable (OP)-Trusted Execution Environment (TEE), an open source implementation of the TEE.

      OP-TEE is a small secure operating system which, after authentication and description, gets loaded in an secured area in the memory. A Rich OS (e.g. Xilinx PetaLinux) driver can request, via a Secure Monitor Call, the execution of a trusted application. MLE took the effort to port OP-TEE to Xilinx Zync UltraScale+ MPSoC Platform, including device specific optimizations.