linaro-swg / optee_android_manifestLinks
Android manifest for building OP-TEE in AOSP
☆41Updated 4 years ago
Alternatives and similar repositories for optee_android_manifest
Users that are interested in optee_android_manifest are comparing it to the libraries listed below
Sorting:
- Makefiles to use OP-TEE on various platforms☆125Updated last week
- Test suite☆86Updated last month
- Normal world linux driver **deprecated**☆67Updated 9 years ago
- Normal World Client side of the TEE☆218Updated this week
- Linux kernel source tree☆44Updated last month
- OP-TEE Sample Applications☆197Updated last week
- OP-TEE based keymaster and gatekeeper HIDL HAL☆40Updated last year
- This git contains the official documentation for the OP-TEE project☆68Updated this week
- Manifests to use OP-TEE on various platforms☆78Updated last week
- Experimental version of QEMU with basic support for ARM TrustZone (security extensions)☆85Updated 12 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆245Updated 7 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆156Updated 6 years ago
- IDA processor module for the hexagon (QDSP6) processor☆236Updated 8 months ago
- mTower is Trusted Execution Environment specially designed to be used on MicroController Units (MCUs) supporting ARM TrustZone technology…☆66Updated 7 months ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Updated 4 years ago
- Tools and images for HiKey960☆55Updated 5 years ago
- Nailgun attack on ARM devices.☆164Updated 4 years ago
- Emulating Exynos 4210 BootROM in QEMU☆77Updated 5 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆38Updated 10 years ago
- Emulate a Trusted Execution Environment that is running the GlobalPlaforms Internal API☆46Updated 2 years ago
- ☆41Updated 8 years ago
- Hexag00n: A collection of reverse engineering tools for the Qualcomm Digital Signal Proccesor (QDSP6)☆115Updated 8 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆81Updated 6 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Updated 5 years ago
- Android driver for the Trusted Execution Environment <t-base☆12Updated 10 years ago
- ☆61Updated 8 years ago
- Overall project configuration and documentation☆84Updated 3 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆93Updated 7 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆45Updated 9 years ago
- Huawei mate 7 TrustZone exploit☆109Updated 10 years ago