Makefiles to use OP-TEE on various platforms
☆129Jan 16, 2026Updated 2 months ago
Alternatives and similar repositories for build
Users that are interested in build are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Manifests to use OP-TEE on various platforms☆79Mar 16, 2026Updated last week
- Test suite☆88Updated this week
- Normal World Client side of the TEE☆221Jan 16, 2026Updated 2 months ago
- OP-TEE Sample Applications☆203Jan 16, 2026Updated 2 months ago
- Trusted side of the TEE☆1,843Updated this week
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- Read-only mirror of Trusted Firmware-A☆2,186Mar 16, 2026Updated last week
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆45Aug 12, 2016Updated 9 years ago
- This git contains the official documentation for the OP-TEE project☆69Feb 13, 2026Updated last month
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆16Nov 10, 2020Updated 5 years ago
- Linux kernel source tree☆44Jan 21, 2026Updated 2 months ago
- Raspbian with OP-TEE support.☆30Mar 17, 2019Updated 7 years ago
- The server part of the SafeKeeper project.☆18Jul 12, 2018Updated 7 years ago
- ☆23May 8, 2017Updated 8 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- ☆29Dec 16, 2022Updated 3 years ago
- ☆23Jun 23, 2023Updated 2 years ago
- ☆42Feb 26, 2023Updated 3 years ago
- ☆32Aug 10, 2020Updated 5 years ago
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆10Sep 7, 2023Updated 2 years ago
- Tools, scripts, and configuration files necessary to demonstrate an end-to-end remote attestation example with SEV-SNP.☆58Jan 26, 2024Updated 2 years ago
- OP-TEE based keymaster and gatekeeper HIDL HAL☆43Oct 8, 2024Updated last year
- helper radare2 script to analyze UEFI firmware modules☆16Aug 30, 2018Updated 7 years ago
- runs several layers of a deep learning model in TrustZone☆95Aug 8, 2024Updated last year
- Port of EDK2 implementation of UEFI to RISC-V. See documentation at:☆26Jan 9, 2022Updated 4 years ago
- ☆28Mar 4, 2025Updated last year
- CoRIM and CoMID manipulation library☆22Mar 9, 2026Updated 2 weeks ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- Python interface to the SGX SDK☆31Oct 25, 2018Updated 7 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- ☆77Jun 14, 2018Updated 7 years ago
- RISC-V CSR Access Routines☆15Dec 27, 2022Updated 3 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 7 months ago
- SGXBounds: Memory Safety for Shielded Execution (compiler pass and runtime)☆33Apr 24, 2017Updated 8 years ago
- Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper☆17Apr 21, 2022Updated 3 years ago
- Reference implementation of RPMI specification as a library.☆15Feb 5, 2026Updated last month
- Secure Virtual Architecture☆42Apr 12, 2019Updated 6 years ago
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated 2 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago