This is part 4 in a series about OP-TEE, the trusted part of a secure linux implementation. In this part, we see how to write and build our first trusted application based on a simple example.
Category: OP-TEE
OP-TEE: Part 3 – Setting up OP-TEE on QEMU & Raspberry Pi 3
This is the part 3 in the series of posts about OP-TEE. In this post, we talk about how to set up and test OP-TEE on two very popularly used platforms - QEMU and Raspberry Pi 3.
OP-TEE: Part 2 – Understanding the OP-TEE Components
This is the part 2 in the series of posts about OP-TEE. In this post, we talk about the various components of the OP-TEE project, what their roles are and finally touch up on Global Platform.
OP-TEE: Part 1 – What A Beginner Needs To Know!
In order to enhance the cybersecurity of linux-based systems as well as to meet compliance requirements, more and more systems are making use of TEE or Trusted Execution Environment to implement security-critical functionality. Where does a beginner start? Read on..