2.5. Security

If you are building a system based on the secure and non-secure capabilities that TrustZone technology provides, then you must consider security issues. This section describes:

Copyright © 2011-2012 ARM. All rights reserved.ARM DDI 0470D
Non-ConfidentialID040512