Hello Suresh:
How are you? I hope all is well with you!
Virtual Linaro Connect Fall is next week and there is a presentation relevant to your question along with some others. As an online event, it is free registration and I am listing here below a few sessions that might be of interest to
you related to security and AI inferencing for microcontrollers:
https://connect.linaro.org/schedule
LVC21F-116 Assessing the effectiveness of MCUBoot protections against fault injection attacks
LVC21F-112 Picolibc: A C Library for Smaller Systems
LVC21F-303 Secure Sensor Data Pipeline
LVC21F-312 TrustedFirmware.org panel discussion
LVC21F-319 TVM for micro targets
I thought you may be interested in the AI as well since there are security implications for trusted AI.
All the best!
Reed
From: TF-M <tf-m-bounces@lists.trustedfirmware.org> on behalf of Suresh Marisetty via TF-M <tf-m@lists.trustedfirmware.org>
Reply-To: "Suresh.Marisetty@infineon.com" <Suresh.Marisetty@infineon.com>
Date: Thursday, September 2, 2021 at 8:23 AM
To: Anton Komlev <Anton.Komlev@arm.com>, "tf-m@lists.trustedfirmware.org" <tf-m@lists.trustedfirmware.org>
Cc: nd <nd@arm.com>
Subject: Re: [TF-M] TF-M v1.3.0 release - Fault Injection and DPA in line with PSA L3 Certification
Hi,
I have a question related to the PSA L3 certification and the requirement to support Side-channel and fault injection attacks.
I have noted that TFM and MCUBoot does implement some software countermeasures for Fault Injection. However, I am wondering if there is similar implementation support for the Crypto Lib in TFM (or Mbed TLS) with software counter measures
for side channel DPA.
Needless to say, there are some known best practices for DPA software countermeasures.
thanks
Suresh Marisetty
Infineon Semiconductor Corporation
From: TF-M <tf-m-bounces@lists.trustedfirmware.org>
On Behalf Of Anton Komlev via TF-M
Sent: Friday, April 9, 2021 6:25 AM
To: tf-m@lists.trustedfirmware.org
Cc: nd <nd@arm.com>
Subject: [TF-M] TF-M v1.3.0 release
Caution: This e-mail originated outside Infineon Technologies. Do not click on links or open attachments
unless you validate it is safe. |
Hello,
TF-M project released version
v1.3.0, tagged as
TF-Mv1.3.0.
Please take a look into the release notes for the new features and changes:
https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/tree/docs/reference/releases/1.3.0.rst
The major features:
This is the first release performed in the OpenCI infrastructure with no single issue encountered.
Thanks to everyone who directly and indirectly contributed to this milestone.
Anton Komlev
TF-M technical lead
Arm Ltd.