linaro-swg / optee_android_manifestLinks
Android manifest for building OP-TEE in AOSP
☆41Updated 4 years ago
Alternatives and similar repositories for optee_android_manifest
Users that are interested in optee_android_manifest are comparing it to the libraries listed below
Sorting:
- Makefiles to use OP-TEE on various platforms☆119Updated last week
- Test suite☆85Updated 2 months ago
- Linux kernel source tree☆44Updated 2 months ago
- OP-TEE Sample Applications☆191Updated last week
- OP-TEE based keymaster and gatekeeper HIDL HAL☆39Updated 11 months ago
- Normal World Client side of the TEE☆213Updated this week
- Normal world linux driver **deprecated**☆67Updated 9 years ago
- Experimental version of QEMU with basic support for ARM TrustZone (security extensions)☆84Updated 11 years ago
- This git contains the official documentation for the OP-TEE project☆65Updated 2 weeks ago
- Android driver for the Trusted Execution Environment <t-base☆12Updated 9 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆151Updated 5 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆91Updated 7 years ago
- Manifests to use OP-TEE on various platforms☆76Updated 3 weeks ago
- mTower is Trusted Execution Environment specially designed to be used on MicroController Units (MCUs) supporting ARM TrustZone technology…☆62Updated 4 months ago
- ☆41Updated 8 years ago
- Emulating Exynos 4210 BootROM in QEMU☆74Updated 5 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Updated 4 years ago
- IDA processor module for the hexagon (QDSP6) processor☆233Updated 5 months ago
- Overall project configuration and documentation☆82Updated 3 years ago
- Emulate a Trusted Execution Environment that is running the GlobalPlaforms Internal API☆45Updated last year
- Android user space components for the Trustonic Trusted Execution Environment☆37Updated 9 years ago
- Reference template to start writing a Trusted Application☆13Updated 7 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- Tools and images for HiKey960☆56Updated 5 years ago
- Nailgun attack on ARM devices.☆167Updated 4 years ago
- Updated opensource kernel to latest 3.10☆60Updated 9 years ago
- kilroy☆38Updated 11 years ago
- Hexag00n: A collection of reverse engineering tools for the Qualcomm Digital Signal Proccesor (QDSP6)☆114Updated 8 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆245Updated 7 years ago