Security Architecture for Embedded Products: When TrustZone Is Enough and When It Is Not

embedded-software

 

The question of where to implement cryptography in an embedded product — in software on the application processor, in an isolated world via TrustZone, or in a physically separate security co-processor — is decided by threat model, not by which option is easiest to implement. Most product teams anchor their security architecture on TrustZone because it comes for free on ARM Cortex-M33 and Cortex-A processors: no additional BOM component, no I2C bus to manage, no external chip to integrate. The assumption that comes with this choice is often implicit: TrustZone is hardware-enforced isolation, and hardware-enforced isolation is adequate for the product's use case.

The assumption is frequently wrong in specific ways that the product team discovers only after deployment, during a security audit, or following a published attack. TrustZone is a hardware-enforced isolation mechanism between two software worlds on the same processor die. It is explicitly not designed to protect against side-channel attacks — ARM says so in its own security documentation. It runs on the same silicon substrate as the normal world, shares the same power supply rails, and produces power and electromagnetic emanations that are correlated with the cryptographic operations it performs. A determined attacker with physical access and measurement equipment can extract keys from a TrustZone secure world through differential power analysis without ever defeating the logical isolation that TrustZone provides. A dedicated security co-processor — a secure element, a TPM, an HSM — runs on separate silicon designed from the ground up with physical attack resistance as a first-class design objective.

Understanding exactly when this distinction matters, and when TrustZone is adequate, requires clarity about what each approach provides and does not provide.

What TrustZone Actually Is — and What It Is Not

ARM TrustZone is a processor architecture extension that partitions execution, memory, and bus transactions between a secure world and a normal world. On Cortex-A processors, this partition enables a Trusted Execution Environment (TEE) running a secure OS alongside a rich OS. On Cortex-M23 and M33, TrustZone-M provides a lighter-weight partition with faster context switching appropriate for microcontrollers.

What TrustZone provides:

  • Hardware-enforced logical isolation: normal-world software cannot read secure-world memory or execute secure-world code without going through secure-callable entry points
  • Secure peripheral access: peripherals can be assigned to the secure world so that normal-world software cannot access their registers
  • Secure boot infrastructure: the secure world can run before the normal world boots, establishing a trusted chain from ROM code
  • Key storage isolation: cryptographic keys held in secure-world memory cannot be read by normal-world software, even if the normal-world OS is compromised

What TrustZone does not provide:

  • Physical isolation from the normal world: both worlds run on the same processor core, sharing the same silicon die, power rail, clock, and physical package
  • Side-channel resistance: TrustZone's secure world produces power consumption and electromagnetic emanations that reflect its operations, extractable by physical measurement
  • Tamper detection: there is no physical mechanism to detect or respond to attempts to probe the processor's signals, modify supply voltage, or inject faults
  • Independent certifiability: the security guarantee is as strong as the implementation of the secure world software, which runs on the same programmable processor as potentially vulnerable code

ARM explicitly acknowledges this limitation: "The Security Extensions for the Armv8-M architecture do not claim to protect against side channel attacks due to control flow or memory access patterns." This is not a flaw in TrustZone's design — it is an accurate characterization of what logical isolation hardware achieves. Side-channel resistance requires dedicated physical countermeasures in the silicon: noise injection, power supply filtering, randomized execution, and metal shielding — design choices that add cost and area that a general-purpose application processor cannot justify for all use cases.

The Secure Element — What Dedicated Silicon Provides

A secure element is a physically separate, tamper-resistant semiconductor device whose primary design objective is protecting cryptographic keys and executing cryptographic operations in a physically hostile environment. The distinction from TrustZone is foundational: a secure element is not an isolation layer on top of a general-purpose processor — it is a separate processor with a separate threat model.

The physical security measures in a dedicated secure element go substantially beyond what an application processor provides:

  • Active shielding: metal mesh layers over the die that detect attempts to probe or remove them
  • Power supply filtering and noise injection: preventing power consumption from being correlated with cryptographic operations
  • Temperature, voltage, and clock frequency monitoring: detecting and responding to fault injection attempts that try to skip security checks or force invalid states
  • Randomized instruction execution: inserting dummy operations to mask timing side channels
  • Memory scrambling: encrypting and integrity-protecting internal SRAM contents even against an attacker who has penetrated the package

These are not optional features — they are the certification requirements that determine whether a secure element achieves PSA Level 2 or Level 3 certification, Common Criteria EAL 5+ or EAL 6+, or FIPS 140-3 Level 3 validation. The PSA Certified framework, designed by ARM for IoT device security, defines levels based on threat protection: PSA Level 1 is software security, Level 2 adds basic hardware Root of Trust, and Level 3 explicitly requires protection against hardware attacks including side-channel and fault injection. By 2023, the first PSA Level 3 certified Root of Trust IP appeared — Intrinsic ID's QuiddiKey 300, a PUF-based key storage component.

The critical property that dedicated secure elements provide and TrustZone cannot is this: a private key generated inside a secure element never leaves the secure element in plaintext form. All cryptographic operations that require the private key — signing, decryption, key agreement — execute inside the secure element, and only the result is returned to the application processor. Even if the application processor running TrustZone is fully compromised — an attacker with full control of both secure and normal worlds — the private key in the secure element remains inaccessible. The attacker can command the secure element to perform operations using the key, but cannot extract the key itself.

The commonly used secure elements for embedded IoT and industrial products include:

  • Microchip ATECC608B: a compact I2C/SPI device providing elliptic curve cryptography (ECDH, ECDSA), AES-128, SHA-256, and 10 KB of secure key storage in a 3mm × 2mm package at roughly $0.50–$1.50 at volume
  • NXP SE050: a JavaCard-based secure element supporting a broader algorithm suite including RSA, AES, 3DES, ECC up to P-521, and post-quantum algorithm readiness; Common Criteria EAL 6+ certified
  • STMicroelectronics STSAFE-A110: compact secure element with I2C interface, ECDSA/ECDH with P-256 and P-384, pre-provisioned device certificate; used in industrial IoT and automotive applications
  • Infineon OPTIGA Trust M: Common Criteria EAL6+ certified secure element with comprehensive PKI support, used in industrial platforms and IIoT gateways

The Threat Model Decision Tree

The choice between TrustZone, dedicated secure element, TPM, or a combination depends entirely on the threat model the product must address. Most products do not require defense against physical side-channel attacks; some do. The engineering decision must be driven by an honest assessment of the threats, not by which option is cheapest or most familiar.

The decision framework follows the attack surface:

If the product operates in a physically controlled environment — deployed in a secure data center, behind a locked enclosure, in a setting where physical access by adversaries is not assumed — then TrustZone or software crypto in a TrustZone TEE is typically adequate. The threat model is remote software attacks, for which TrustZone's logical isolation provides meaningful protection. The normal-world OS can be compromised without exposing secure-world keys.

If the product is deployed in a physically accessible location — an IoT device in a building, a meter at a customer premises, an EV charger in a parking lot, a payment terminal in a retail environment — the threat model must include physical access by adversaries of varying sophistication. For these cases, the question is what the adversary gains by extracting a key from the device. If the key is a device-specific identity key, extraction enables cloning the device's identity. If the key is a firmware signing key or a class secret shared across all devices, extraction enables a fleet-wide attack. The higher the value of what the key protects and the broader the blast radius of its compromise, the stronger the argument for dedicated secure element rather than TrustZone-only.

If the product handles payment credentials, high-value authentication tokens, or keys whose extraction would compromise critical infrastructure, regulatory requirements may mandate hardware security evaluation: PCI DSS requires tamper-resistant hardware for cardholder data environments, and many national critical infrastructure regulations specify equivalent requirements. In these cases, the question is not whether to use dedicated secure silicon but which certification level is required.

The following table maps threat scenarios to recommended security architecture:

Deployment context

Physical access risk

Key value

Recommended architecture

Server/cloud backend

Low

High

HSM (FIPS 140-3 L3)

Industrial gateway, locked enclosure

Medium

Medium

TrustZone + OTP key storage

IoT sensor, public access premises

High

Device identity only

Secure element (ATECC608, SE050)

Payment terminal, ATM

High

Financial credentials

Certified secure element (CC EAL 6+)

Critical infrastructure device

High

Fleet-wide impact

Secure element + tamper detection

Automotive ECU

Medium-high

Safety / OTA integrity

HSM-on-chip (embedded security module)

TrustZone Attacks in Practice — Understanding the Real Exposure

TrustZone has been subject to a substantial body of published attack research. Quarkslab and others have documented successful attacks against TrustZone implementations, and understanding the categories of attack clarifies which threat model elements TrustZone handles poorly.

Software attacks on TrustZone target the secure world software directly: vulnerabilities in the TEE OS, in trusted applications (TAs) running in the secure world, or in the secure-to-non-secure interface create paths for normal-world attackers to escalate into the secure world. These are the attacks that TrustZone was designed to prevent but that its design does not guarantee — it prevents unauthorized direct memory access by normal-world software, but a vulnerable TA that processes attacker-controlled input can still be exploited by a normal-world attacker who sends malformed messages through the TEE API. The secure world software must itself be correct, and TrustZone does not verify its correctness.

Physical attacks exploit the shared silicon substrate. Differential power analysis (DPA) measures the power consumed by the processor during cryptographic operations and correlates it with key-dependent intermediate values to reconstruct private keys. Simple power analysis (SPA) identifies operations visually from power traces. Electromagnetic analysis (EMA) performs the same correlation using electromagnetic field measurements rather than power supply measurements. Fault injection through voltage glitching or clock glitching causes the processor to execute instructions incorrectly, potentially skipping security checks or generating predictable output from operations that should be random. None of these attacks require defeating TrustZone's logical isolation — they operate at the physical layer below the logical security boundary.

A 2026 systematic review of embedded hardware security published in MDPI Electronics confirms that side-channel mitigation for cryptographic operations on general-purpose MCUs carries significant overhead: masked implementations of post-quantum cryptographic algorithms (lattice-based schemes from FIPS 203/204/205, finalized by NIST in August 2024) require additional power, area, and performance overhead that is difficult to justify in cost-sensitive IoT deployments without the dedicated silicon designed for this purpose. This further reinforces that the appropriate solution for environments requiring physical attack resistance is dedicated secure silicon, not software countermeasures on top of a general-purpose processor.

 

Post-Quantum Implications for Embedded Security Architecture

 

Post-Quantum Implications for Embedded Security Architecture

The NIST post-quantum cryptography standards finalized in August 2024 — FIPS 203 (ML-KEM, based on CRYSTALS-Kyber), FIPS 204 (ML-DSA, based on CRYSTALS-Dilithium), and FIPS 205 (SLH-DSA) — have direct implications for the embedded security co-processor choice. Post-quantum algorithms are computationally more expensive than the ECC algorithms they replace, which affects both the case for dedicated acceleration and the security properties of the solutions.

For software implementations of PQC algorithms on constrained Cortex-M targets, the performance cost is significant: ML-KEM key generation and encapsulation require substantially more cycles than ECDH equivalents, and ML-DSA signature operations are heavier than ECDSA. These performance costs make the case for dedicated hardware acceleration stronger than it was for ECC. Secure elements and embedded HSMs that include hardware acceleration for PQC algorithm primitives — particularly the polynomial multiplication at the core of lattice-based algorithms — provide the performance needed for PQC in real-time embedded applications without the CPU overhead that software PQC imposes.

The side-channel security of PQC implementations adds further pressure toward dedicated silicon. Research has demonstrated that lattice-based polynomial multiplication operations have different power leakage patterns than AES or ECC, creating new side-channel attack surfaces that require new countermeasures. Masked hardware implementations of lattice operations have been demonstrated by research groups, but deploying these in production requires either custom silicon design or secure elements from vendors that have already developed and certified masked PQC implementations. The NXP SE050 and its successors in the SE05x family have roadmap support for post-quantum algorithms; Microchip's ECC608 successor families are similarly positioning for PQC support. For products with 10+ year lifetimes that need to be PQC-capable, selecting a secure element with a credible PQC migration roadmap today is preferable to retrofitting PQC support into a TrustZone software implementation later.

Hybrid Architecture — When to Combine Both

Most production embedded security architectures for non-trivial products use both TrustZone and a dedicated secure element, assigning different responsibilities to each based on their respective strengths. This is not redundancy — it is defense in depth where each element is providing protection against a different attack category.

TrustZone handles software isolation: protecting secure boot logic, key wrapping operations, and trusted application isolation from a potentially compromised normal-world OS. The secure world can orchestrate operations against the external secure element without exposing the element's response data to normal-world software.

The secure element handles physical key protection: storing the device's identity private key, performing signing and key agreement operations that require that key, providing tamper-evident storage for critical credentials, and providing a hardware root of trust that is independent of the application processor's correctness.

This division of responsibility maps cleanly to the threats each component addresses:

  • Remote software attacker who compromises the normal-world OS → TrustZone prevents them from accessing secure-world data
  • Remote software attacker who compromises the TrustZone secure world → secure element prevents them from extracting the device identity key
  • Physical attacker with side-channel equipment → secure element's physical countermeasures prevent key extraction from its silicon
  • Physical attacker attempting fault injection on the application processor → secure element is unaffected by faults on the application processor's supply or clock

Silicon Labs Series 2 devices illustrate this hybrid architecture in a commercial product: devices with a dedicated Hardware Security Module (HSM Vault, labeled SVH) provide physically protected key storage and cryptographic acceleration via a separate secure core; devices without the dedicated HSM (SVM) implement secure key storage through TrustZone, providing software isolation at lower cost but without hardware attack resistance.

Quick Overview

TrustZone provides hardware-enforced logical isolation between secure and normal worlds on the same processor die — protecting against software attacks but explicitly not against physical side-channel attacks like differential power analysis or fault injection. Dedicated security co-processors (secure elements, TPMs, embedded HSMs) provide physical tamper resistance through active shielding, power supply filtering, and execution randomization, ensuring that private keys never leave the secure element in plaintext even under physical attack. The architectural decision between TrustZone, dedicated secure silicon, or a hybrid of both is determined by the threat model: physical accessibility of the device, the value and blast radius of protected keys, and applicable regulatory requirements. NIST PQC standards finalized in 2024 add new considerations around algorithm performance and side-channel resistance that further favor hardware acceleration in constrained embedded deployments.

Key Applications

IoT devices deployed at customer premises or in publicly accessible locations where physical access enables side-channel attacks on device identity keys, payment terminals and financial devices requiring PCI DSS tamper-resistant hardware certification, automotive ECUs where the embedded HSM (EVITA, SHE) standard separates security-critical key operations from the application processor, industrial IIoT gateways requiring device authentication for IEC 62443 compliance with hardware-backed attestation, and any product family where a single device's key compromise would enable a class-break attack against all devices with the same secret.

Benefits

Secure elements ensure private keys never leave the secure element — even a fully compromised application processor cannot extract them, only command operations with them. PSA Level 3 and Common Criteria EAL 6+ certifications provide independently verified evidence that physical attack countermeasures are adequate, reducing security audit burden. The BOM cost of a secure element like the ATECC608B at $0.50–$1.50 is low relative to the value of the identity credentials it protects across a device's 10+ year operational lifetime. Hybrid TrustZone + secure element architectures provide defense in depth covering both remote software attacks (TrustZone) and physical attacks (secure element).

Challenges

Secure elements add BOM cost, a physical component, I2C or SPI bus integration, a driver layer, and vendor-specific API dependencies to a product that TrustZone-only avoids. The secure element's private key being non-extractable is also a limitation: if the device is decommissioned and the key must be transferred to a replacement device, the architecture must provision a new key in the new device's secure element rather than migrating the old key. PQC-capable secure elements from mainstream vendors are in development but not universally available at the algorithm coverage and performance levels that PQC-only deployments require, creating transition planning uncertainty.

Outlook

PSA Certified adoption as a procurement requirement in IoT device security — already referenced in EU Cyber Resilience Act guidance and national cybersecurity frameworks — is creating market pressure for embedded products to achieve at minimum PSA Level 2 certification, which requires a hardware Root of Trust. This is accelerating adoption of dedicated secure elements and embedded HSM IP in products that previously relied on TrustZone alone. The PQC transition adds further urgency: devices shipping today with 10+ year lifetimes need PQC-capable cryptographic infrastructure, which the current generation of secure elements from NXP, Microchip, and STMicroelectronics is positioning to provide through algorithm update roadmaps.

Related Terms

TrustZone, TEE, trusted execution environment, secure element, SE, TPM, trusted platform module, HSM, hardware security module, secure world, normal world, Cortex-M33, TrustZone-M, ARMv8-M, side-channel attack, differential power analysis, DPA, simple power analysis, SPA, electromagnetic analysis, fault injection, voltage glitching, clock glitching, root of trust, hardware root of trust, PSA Certified, PSA Level 3, Common Criteria, EAL 6, ATECC608B, SE050, STSAFE, OPTIGA Trust, PUF, physically unclonable function, QuiddiKey, FIPS 203, FIPS 204, FIPS 205, ML-KEM, ML-DSA, post-quantum cryptography, crypto agility, EVITA, SHE, IEC 62443, PCI DSS, secure boot, OTP fuse, key wrapping, device identity, class-break attack, physical attack resistance, masked implementation

 

Contact us

 

 

Our Case Studies

 

FAQ

Why does TrustZone not protect against side-channel attacks?

 

TrustZone is a logical isolation mechanism implemented in the processor's execution architecture: it prevents software in the normal world from accessing secure-world memory or executing secure-world code. Both worlds run on the same physical processor die, sharing the same power supply, clock distribution, and silicon substrate. Power consumption during cryptographic operations in the secure world reflects the computation being performed and can be measured externally. Differential power analysis uses statistical correlation of many power measurements during known-input operations to reconstruct internal key-dependent intermediate values, recovering the private key without ever defeating the logical isolation. ARM explicitly states in its documentation that Armv8-M TrustZone does not claim to protect against side-channel attacks.
 

What is the practical difference between a secure element and a TrustZone TEE for key storage?

 

In a TrustZone TEE, private keys are stored in secure-world memory on the application processor. They are protected from normal-world software access but remain on the processor's silicon and can be extracted through physical side-channel or fault injection attacks. In a dedicated secure element, private keys are generated inside the secure element and never leave it in plaintext form — all operations requiring the key execute inside the secure element, and only the operation's result is returned to the application processor. Even a fully compromised application processor cannot extract the key from the secure element; the attacker can only ask the secure element to use the key, not access it directly.
 

When should an embedded product design use a dedicated secure element instead of relying on TrustZone?

 

A dedicated secure element is warranted when the product is deployed in a physically accessible location where adversaries may gain direct access to the device hardware, when the protected keys have high value or broad impact if extracted, such as device fleet identity, payment credentials, or safety-critical OTA signing, or when regulatory requirements mandate tamper-resistant hardware, such as payment terminal standards or national critical infrastructure regulations. For products in controlled physical environments where the primary threat is remote software attack, TrustZone TEE is typically adequate. The threat model, specifically whether physical access is in scope and what the blast radius of key extraction would be, is the determinative factor.
 

How do NIST post-quantum cryptography standards affect the embedded security co-processor choice?

 

The PQC algorithms standardized by NIST in August 2024, ML-KEM, ML-DSA, and SLH-DSA, are computationally more expensive than the ECC algorithms they replace, strengthening the case for dedicated hardware acceleration in constrained embedded environments. They also introduce new side-channel leakage patterns that require new masked hardware implementations for physical attack resistance. Deploying PQC with adequate physical security requires either custom silicon countermeasures or secure elements from vendors with certified masked PQC implementations. For embedded products with 10+ year lifetimes that will need to migrate to PQC, selecting a secure element vendor with a credible PQC roadmap is preferable to attempting software PQC on a TrustZone platform without physical attack countermeasures.