This is part 4 in a series about OP-TEE, the trusted part of a secure linux implementation. In this part, we see how to write and build our first trusted application based on a simple example.
Tag: security
OP-TEE: Part 3 – Setting up OP-TEE on QEMU & Raspberry Pi 3
This is the part 3 in the series of posts about OP-TEE. In this post, we talk about how to set up and test OP-TEE on two very popularly used platforms - QEMU and Raspberry Pi 3.
OP-TEE: Part 2 – Understanding the OP-TEE Components
This is the part 2 in the series of posts about OP-TEE. In this post, we talk about the various components of the OP-TEE project, what their roles are and finally touch up on Global Platform.
OP-TEE: Part 1 – What A Beginner Needs To Know!
In order to enhance the cybersecurity of linux-based systems as well as to meet compliance requirements, more and more systems are making use of TEE or Trusted Execution Environment to implement security-critical functionality. Where does a beginner start? Read on..
Raspberry Pi + ATECC608: Part 2 – About PKCS#11 and Testing Mutual TLS Authentication
Looking for a great introduction to the PKCS#11 standard? Look no further! This post talks about PKCS#11, Cryptoki and demonstrates practically how to use PKCS#11 tokens to achieve mutual TLS authentication.
Raspberry Pi + ATECC608: Part 1 – Overcoming Modern IoT Security Challenges
Embedded systems are tough. Implementing security the right way is even tougher for such systems. Let us look at how a hardware security chip can help address the challenges in connected IoT nodes.
Embedded Security #4 – Diversify Everything!
Diversification is at the heart of a lot of commercially successful embedded systems. However, it is not very well understood. Let us attempt to understand what it is all about...
Embedded Security #3 – Immutable Boot Code
Secure Embedded Systems need immutable boot code now more than ever...let us understand what it is!
Embedded Security #2 – Hardware Root Of Trust
Looking for a simple introduction to hardware root of trust in embedded systems? Read on...
Embedded Security #1 – The Basics
A small glimpse into the vast world of embedded security...