Professional Documents
Culture Documents
Features
Jella Kate L. Flores Jahziel M. Jalon Kimberly Conje
College of Electrical Engineering and College of Electrical Engineering and College of Electrical Engineering and
Technology Technology Technology
Mindanao State University-Iligan Mindanao State University-Iligan Mindanao State University-Iligan
Institute of Technology Institute of Technology Institute of Technology
Iligan City, Philippines Iligan City, Philippines Iligan City, Philippines
jellakate.flores@g,msuiit.edu.ph jahziel.jalon@g,msuiit.edu.ph kimberly.conje@g,msuiit.edu.ph
Abstract—IoT security is an essential key for the development bytes of RAM, secure boot, secure key storage, secure
of devices or embedded applications, if not taken seriously IoT bootloader, and crypto accelerator.
nodes would be vulnerable to hardware and software attacks
endangering the user's personal information. The SAM L11 family The SAM L11 family of MCUs utilizes some functions of
of MCUs takes IoT security as its main function with its low the Arm® Cortex®-M23 processor that is one of the newest
power-consumption that is ideal for developers to use for IoT and highly popular Cortex-M processors and was developed
innovations. This paper presents the integration of the TrustZone® for high-performance, low-cost platforms for a broad range
technology for the ARMv8-M and Cortex-M23 processor to the of devices. The Cortex®-M23 processor is a configurable,
SAM L11 family of MCUs for the IoT robust and energy-efficient two-stage, 32-bit RISC processor. It has an AMBA 5 AHB
security. interface and includes an NVIC component. With the
TrustZone® technology added to its security foundation, its
Keywords—microcontroller, processor, architecture, security optional hardware debug, single-cycle I/O interfacing, and
features, SAM L11 memory-protection functionality it takes security to the most
constrained IoT devices and embedded applications.
I. INTRODUCTION
With the increasing development of IoT endpoints and This paper presents an in-depth review of the utilization of
the increased frequency of security breaches, security in IoT the functions from the Arm Cortex®-M23 processor with
devices has become even more essential. The MCU families the Arm® TrustZone® technology for Armv8-M
of SAM L10 and SAM L11 provide the solution to these architecture to SAM L11 family of MCU.
IoT innovations and embedded applications issues with
security, power-efficiency, and touch application. It has
industry-leading security for its performance class and is the
industry's first Arm® Cortex®-M23 with robust chip-level
II. REVIEW OF RELATED LITERATURE
security features and Arm® TrustZone® for Armv8-M.
ARMv8-M architecture is a 32-bit architecture based on
the existing ARMv6-M and ARMv7-M architectures and
has most features of the Cortex®-M programmer’s model. It
paves the way for highly scalable, cost-effective families of
microcontroller. It also introduces a hardware security
model that is a foundation for secure connected devices
(Fig. 2.1). This figure is obtained from [cite].
[cite]Additional architecture fundamentals include: Cross Trigger Interface (CTI) - Enables the debug logic
● An expanded 32-bit instruction set that provides and the ETM to interact with each other and with other
improved performance when compared to the CoreSight components.[cite]
ARMv8-M baseline architecture.
● An optional integer Digital Signal Processing (DSP) for Embedded Trace Macrocell (ETM) - is a real-time trace
efficient signal processing. module providing instruction and data tracing of a
● An optional floating-point extension architecture with processor. An ETM is an integral part of an ARM
support for single-precision floating-point and optional RealView® debug solution[cite]
support for double-precision floating-point operations.
● Optional coprocessor support for hardware acceleration. Nested Vectored Interrupt Controller (NVIC) - The
NVIC supports four programmable levels of priority while
AIRCR.PRIS increases the levels to eight, as it splits Secure
[cite]The ARMv8-M mainline architecture has the
and Non-secure priorities. The NVIC and the Cortex-M23
following upgrades over the ARMv7-M architecture: processor core are closely coupled, providing low latency
● Test Target Memory (TT) instruction. interrupt processing and efficient processing of late arriving
● Memory access instructions for C++11 atomic data interrupts. [cite]
types (load-acquire and store-release instructions).
Wake-up Interrupt Controller (WIC) - enables the
[cite]System level feature enhancements include: processor and NVIC to be put into a very low-power sleep
● Optional TrustZone® technology for the ARMv8-M mode leaving the WIC to identify and prioritize interrupts
architecture. and event.[cite]
Data Watchpoint and Trace (DWT) - DWT
implementation provides between zero and four watchpoint
register sets. A processor that is configured with zero
watchpoint implements no watchpoint functionality and the
ROM table shows that no DWT is implemented.[cite]
ACKNOWLEDGMENT (Heading 5)
The preferred spelling of the word “acknowledgment” in
America is without an “e” after the “g”. Avoid the stilted
expression “one of us (R. B. G.) thanks ...”. Instead, try “R.
B. G. thanks...”. Put sponsor acknowledgments in the
unnumbered footnote on the first page.
REFERENCES
The template will number citations consecutively within
brackets [1]. The sentence punctuation follows the bracket
Figure 3. Secure/non-secure embedded application [2]. Refer simply to the reference number, as in [3]—do not
● System Start- After power-on or reset, an ARMv8-M use “Ref. [3]” or “reference [3]” except at the beginning of a
system starts code execution in the secure state. sentence: “Reference [3] was the first ...”
● User Application- Control can be transferred to the Number footnotes separately in superscripts. Place the
non-secure state to execute user code. This code can actual footnote at the bottom of the column in which it was
only call functions in the secure state, which are marked cited. Do not put footnotes in the abstract or reference list.
for execution with the SG (secure gate) instruction and Use letters for table footnotes.
additional memory attributes. Any other attempt to
Unless there are six authors or more give all authors’
access memory or peripherals that are assigned to the
names; do not use “et al.”. Papers that have not been
secure published, even if they have been submitted for publication,
● Firmware callbacks - Code running in the secure state should be cited as “unpublished” [4]. Papers that have been
can execute code in the non-secure state using call-back accepted for publication should be cited as “in press” [5].
function pointers. For example, a communication stack Capitalize only the first word in a paper title, except for
(protected firmware) could use an I/O driver that is proper nouns and element symbols.
configured in user space.
● Secure software can access both Secure and For papers published in translation journals, please give
Non-Secure memories and resources, while Non-Secure the English citation first, followed by the original
software can only access Non-Secure memories and foreign-language citation [6].
resources. In the SAM L11 devices where TrustZone is
implemented, the system starts up in Secure state by [1] https://microchipdeveloper.com/32arm:saml11-processor-overview
[2]
default. http://ww1.microchip.com/downloads/en/AppNotes/SAM-L11-Securi
● This selection of secure vs. non-secure code and ty-ReferenceGuide-AN-DS70005365A.pdf
[3]
peripheral sets requires knowledge of possible attacks https://ww1.microchip.com/downloads/en/DeviceDoc/SAM-L10L11-
and threat models. Functions should be in the Family-Data-Sheet-DS60001513G.pdf
[4] Using TrustZone for Armv8-M. (n.d.). Using TrustZone for Armv8-M;
non-secure space by default, as any code inside the www.keil.com. Retrieved May 26, 2022, from
secure space could be a possible attack vector to bypass https://www.keil.com/pack/doc/CMSIS/Core/html/using_TrustZone_
pg.html
the security mechanisms.[5] [5] https://tches.iacr.org/index.php/TCHES/article/view/8347/7696
● The chip-level security incorporated into SAM L11
MCUs is based on ARM TrustZone technology to help [6] Menasveta, T., Soubra, D., & Yiu, J. (2016). Introducing arm
cortex-M23 and cortex-M33 processors with TrustZone for armv8-M.
protect against both physical and remote attacks plus a Design And Reuse. Retrieved June 3, 2022, from
comprehensive security solution framework to simplify https://www.design-reuse.com/articles/41791/arm-cortex-m23-m33-pr
ocessors-with-trustzone-for-armv8-m.html?fbclid=IwAR2QbRxMllZr
the implementation of security. IoT nodes driven by a kE4m1LfUtDH1hwVtHE1mcEuYZkgi6nG3kBZIE0Uumvb74wQ
SAM L11 provide strong resistance to remote software
[7]
attacks, thereby increasing the reliability and avoiding https://developer.arm.com/Processors/Cortex-M23#Technical-Specifi
any downtime of the critical functions of the nodes. [9] cations
[8] https://www.arm.com/products/silicon-ip-cpu/cortex-m/cortex-m3
[9] Gazmer, J. (2018). element14 Announces Availability of Microchip
SAM L10 and SAM L11 Evaluation Kits [web log]. Retrieved June 1,
2022, from/. ensure that all template text is removed from your
https://www.bisinfotech.com/element14-avails-microchips-sam-l10-sa
m-l11-evaluation-kits/ conference paper prior to submission to the
conference. Failure to remove template text from
IEEE conference templates contain guidance text for your paper may result in your paper not being
composing and formatting conference papers. Please published.