linaro-swg / optee_android_manifest
Android manifest for building OP-TEE in AOSP
☆41Updated 3 years ago
Alternatives and similar repositories for optee_android_manifest
Users that are interested in optee_android_manifest are comparing it to the libraries listed below
Sorting:
- Makefiles to use OP-TEE on various platforms☆119Updated last week
- Linux kernel source tree☆43Updated last week
- Normal world linux driver **deprecated**☆66Updated 8 years ago
- OP-TEE based keymaster and gatekeeper HIDL HAL☆38Updated 7 months ago
- Test suite☆83Updated last week
- Manifests to use OP-TEE on various platforms☆75Updated last week
- Normal World Client side of the TEE☆203Updated 2 weeks ago
- This git contains the official documentation for the OP-TEE project☆63Updated last week
- OP-TEE Sample Applications☆181Updated last week
- Emulate a Trusted Execution Environment that is running the GlobalPlaforms Internal API☆46Updated last year
- Experimental version of QEMU with basic support for ARM TrustZone (security extensions)☆84Updated 11 years ago
- All the software you need to run OP-TEE on the HiKey board☆15Updated 7 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆138Updated 3 years ago
- ☆23Updated 8 years ago
- Emulating Exynos 4210 BootROM in QEMU☆73Updated 5 years ago
- ☆42Updated 8 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆150Updated 5 years ago
- Android driver for the Trusted Execution Environment <t-base☆12Updated 9 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆36Updated 9 years ago
- Overall project configuration and documentation☆82Updated 3 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆89Updated 6 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- Tools and images for HiKey960☆56Updated 5 years ago
- ☆32Updated 4 years ago
- IDA processor module for the hexagon (QDSP6) processor☆231Updated last month
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆14Updated 4 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Updated 9 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆242Updated 7 years ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆24Updated 2 years ago