jenswi-linaro / lcu14_optee_hello_world
☆22Updated 7 years ago
Alternatives and similar repositories for lcu14_optee_hello_world:
Users that are interested in lcu14_optee_hello_world are comparing it to the libraries listed below
- Demo Trusted Application using Comcast Crypto API and OP-TEE☆11Updated 8 years ago
- Android manifest for building OP-TEE in AOSP☆40Updated 3 years ago
- Makefiles to use OP-TEE on various platforms☆114Updated 2 weeks ago
- Experimental version of QEMU with basic support for ARM TrustZone (security extensions)☆84Updated 11 years ago
- Normal world linux driver **deprecated**☆66Updated 8 years ago
- Test suite☆81Updated 2 weeks ago
- Normal World Client side of the TEE☆196Updated last month
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆242Updated 7 years ago
- OP-TEE Sample Applications☆173Updated last month
- Reference template to start writing a Trusted Application☆13Updated 7 years ago
- All the software you need to run OP-TEE on the HiKey board☆15Updated 6 years ago
- SGXBounds: Memory Safety for Shielded Execution (compiler pass and runtime)☆32Updated 7 years ago
- This repository contains several tools to perform Cache Template Attacks☆145Updated last year
- TrustZone project with Linux 2.6.35 and U-Boot (i.MX53QSB)☆8Updated 10 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆79Updated 5 years ago
- ⛔️ DEPRECATED☆37Updated 3 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆30Updated 6 years ago
- This git contains the official documentation for the OP-TEE project☆63Updated last month
- LTZVisor: a Lightweight TrustZone-assisted Hypervisor☆80Updated 6 years ago
- This repository contains examples of Flush+Flush cache attacks☆157Updated 3 years ago
- Linux kernel source tree☆42Updated last month
- ☆185Updated 8 months ago
- Minimal RISC Extensions for Isolated Execution☆51Updated 5 years ago
- ☆55Updated 2 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆60Updated 7 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆134Updated 3 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 8 years ago
- ☆73Updated 6 years ago
- Buffer overflow testbed, research paper published at ACSAC 2011☆91Updated 7 years ago
- ARM Trusted Firmware☆14Updated 7 years ago