Hello Bohdan,
Looks like the design docs are full of word instead of diagrams, I tried to search the public docs and found these diagrams, please check if it could be useful: https://tf-m-user-guide.trustedfirmware.org/technical_references/design_docs...
/Ken
From: Bohdan.Hunko--- via TF-M tf-m@lists.trustedfirmware.org Sent: Thursday, December 1, 2022 10:26 PM To: tf-m@lists.trustedfirmware.org Cc: Hennadiy.Kytsun@infineon.com; Roman.Mazurak@infineon.com; Chris.Brand@infineon.com Subject: [TF-M] TF-M threat modeling diagrams
Hi all,
Our team is working on TFM threat modeling, we are analyzing existing code to find and fix any security issues/problems with it.
To better perform this modeling we are interested in having detailed diagrams of TFM boot and execution flows. Ideally the diagrams should be quite detailed to show system state transitions, detailed execution flow and any actions that are not obvious when first looking into TFM code (e.g. scheduling of nested calls, execution of secure IRQs that interrupt nested scheduling, ....).
Does TFM community have such (or similar) diagrams/? If so then where can we find them?
We think that these diagrams may be very useful to TFM in general. They will let TFM users easily understand how TFM works (in details).
Regards, Bohdan Hunko
Cypress Semiconductor Ukraine Engineer CSUKR CSS ICW SW FW Mobile: +38099 50 19 714 Bohdan.Hunko@infineon.commailto:Bohdan.Hunko@infineon.com