This section goes over the 4 basic components at the base of the security pyramid.
Texas Instruments
Secure Boot
Secure boot establishes the root of trust to authenticate and protect boot code and data. If the boot process is not secure, then no other subsequent process that executes on the system can be assumed to be secure.
Texas Instruments
Device Identity and Keys
In order to maintain integrity, authenticity, and confidentiality, embedded processors can be programmed with symmetric or asymmetric key pairs.
Texas Instruments
Cryptographic Acceleration
Cryptographic processing involves generating, verifying, and certifying various public and private keys. This kind of processing can take a toll on the performance and throughput of an embedded system.
Texas Instruments
Debug Security
Debug Framework on TI’s ARM based devices is provided to support software development, system development, debug and profiling for the devices.