Chapter 9 Building Secure and Non-secure Images Using Arm®v8‑M Security Extensions

Describes how to use the Arm®v8‑M Security Extensions to build a secure image, and how to allow a non-secure image to call a secure image.

It contains the following sections:
Non-ConfidentialPDF file icon PDF versionDUI0773I
Copyright © 2014–2017 Arm Limited (or its affiliates). All rights reserved.