Table of Contents

Cover image

Title page

Copyright

Foreword

Chapter 1: Introduction

Abstract

Arm Platform Security Architecture

Assumptions

Structure of the book

Tutorial exercises

Important

Chapter 2: Arm platform security architecture

Abstract

Introduction

Analyze

Architect

Implement

PSA certification

Conclusion

Chapter 3: Development tools and device platform

Abstract

Introduction

Hardware

Software

Install MDK packs and utilities

Conclusion

Chapter 4: Cryptography—The basics

Abstract

Introduction

mbedTLS

Information assurance

Security services

Ciphers

Streaming block ciphers

Hash functions

Authenticated encryption

Random numbers

Managing keys

Conclusion

Chapter 5: Cryptography—Secure communications

Abstract

Introduction

Asymmetric ciphers

Elliptic curve cryptography

Message signing

Using asymmetrical ciphers

Man in the Middle

Public key infrastructure

X.509 certificates

Certificate validation

Certificate lifetime

Certificate revocation list

Certificate encoding

Certificate authority selection

Certificate chain

Exercise: Creating X.509 certificates

Putting it all together

Exercise: TLS server authentication

Conclusion

Chapter 6: IoT networking and data formats

Abstract

Introduction

Message queued telemetry transport (MQTT)

Data formats

Conclusion

Chapter 7: Using an IoT cloud service

Abstract

Introduction

AWS account

AWS IoT

Connect a device

Create a connection policy

Adding the Dynamo DB database

Action rules

IoT analytics

Logs

Lambda

Device services

Conclusion

Chapter 8: Software attacks and threat modeling

Abstract

Introduction

Common security exploits and vulnerabilities

Mitigation

Threat modeling

Conclusion

Chapter 9: Building a defense with the PSA security model

Abstract

Introduction

Software architecture

Temporal barrier

Runtime isolation

PSA Execution environment

Runtime partitions

Secure services

Secure Boot

PSA parameters

Lifecycle

Device requirements

Conclusion

Chapter 10: Device partitioning with TrustZone

Abstract

Introduction

TrustZone security extension

Programmers model

TrustZone operation

TrustZone configuration

TrustZone interrupt handling

TrustZone system control block

SysTick

Exercise: TrustZone SysTick support

Using an RTOS with TrustZone

Memory protection unit (MPU)

CMSIS-zone

Conclusion

Chapter 11: The NXP LPC55S69 a reference IoT microcontroller

Abstract

Introduction

Trusted execution environment (TEE)

Security architecture

Hardware accelerators

Conclusion

Chapter 12: Trusted firmware

Abstract

Introduction

Installation

Exercise: TF-M setup and testing

TF-M software design

Conclusion

Chapter 13: Trusted firmware secure services

Abstract

Introduction

Nonsecure client

Security services

Conclusion

Chapter 14: The PSA Secure Bootloader

Abstract

Introduction

Updatable bootloader

Upgrade strategies

Firmware update service

Image encapsulation

Image signing

BL2 configuration

Updating the bootloader keys

Exercise: Bootloader keys

Bootloading by hardware key

Image encryption

Measured boot

Conclusion

Bibliography

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.211.87