XMC-528 Xilinx Zynq Ultrascale+ Quad-core Arm A53 Secure Mezzanine

XMC-528
XMC-528 Xilinx Zynq Ultrascale+ Quad-core Arm A53 Secure Mezzanine
Product Sheet
Product Sheet

Silver Honoree - 2022 MAE Innovators Awards

The XMC-528 is a high-performance, user-programmable processing and FPGA resource for embedded security applications or use as an FPGA co-processing engine.

Key Features

  • Xilinx Zynq Ultrascale+ MPSoC ZU11EG or ZU7EG FPGA
  • Embedded quad-core Arm A53 @ 1.3GHz
  • 8GB DDR4 PS SDRAM with ECC
  • 8GB DDR4 PL SDRAM with ECC
  • Gen 3 x8 PCIe on Pn5 with 4-channel DMA engine
  • PetaLinux RTOS
  • Available in standard air-cooled and conduction-cooled rugged form factors

Applications

  • Secure processing engine
  • FPGA co-processor for high-density processing
CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

XMC-528 Xilinx Zynq Ultrascale+ Quad-core Arm A53 Secure Mezzanine

For embedded security applications

The XMC-528 is a high-performance, user-programmable processing and FPGA resource for embedded security applications or use as an FPGA co-processing engine.

High-performance, user-programmable processing and FPGA resource

The XMC-528’s Xilinx FPGA resources, Arm cores, and I/O make it ideal for applications that require a combination of software and FPGA logic, such as security or FPGA co-processing. The XMC-528 comes standard with a Xilinx ZU11EG which has four Arm A53 and two Arm R5 processing cores and 299K LUTS of FPGA logic. The XMC-528 is available as an air-cooled or as a rugged conduction-cooled XMC.

Support for enhanced TrustedCOTS (eTCOTS)

The MPSoC used on the XMC-528 supports the integration of defense-grade security IP from Curtiss-Wright and our eTCOTS partners. The XMC-528 follows the Xilinx secure boot methodology.

FPGA toolkit for simplified application development

The XMC-528 is available with an HDK/SDK that includes a sample reference design and simulation test bench and scripts to aid in application development. Curtiss-Wright can also provide specialized toolkits for a variety of application-specific use cases.

Our Approach to Secure Processing

The threats facing today's defense and aerospace applications are more varied and sophisticated than ever. Curtiss-Wright builds trusted computing technologies and techniques into every aspect of our security solution development, from design and testing to supply chain and manufacturing. This comprehensive, end-to-end approach creates an effective mesh of protection layers that integrate to ensure reliability in the face of attempted compromise. Learn more about our Trusted COTS and enhanced Trusted COTS approaches to program protection.