OP-TEE: Part 4 – Writing Your First Trusted Application

This is part 4 in a series about OP-TEE, the trusted part of a secure linux implementation. In this part, we see how to write and build our first trusted application based on a simple example.

OP-TEE: Part 3 – Setting up OP-TEE on QEMU & Raspberry Pi 3

This is the part 3 in the series of posts about OP-TEE. In this post, we talk about how to set up and test OP-TEE on two very popularly used platforms - QEMU and Raspberry Pi 3.

OP-TEE: Part 2 – Understanding the OP-TEE Components

This is the part 2 in the series of posts about OP-TEE. In this post, we talk about the various components of the OP-TEE project, what their roles are and finally touch up on Global Platform.

OP-TEE: Part 1 – What A Beginner Needs To Know!

In order to enhance the cybersecurity of linux-based systems as well as to meet compliance requirements, more and more systems are making use of TEE or Trusted Execution Environment to implement security-critical functionality. Where does a beginner start? Read on..

Raspberry Pi + ATECC608: Part 2 – About PKCS#11 and Testing Mutual TLS Authentication

Looking for a great introduction to the PKCS#11 standard? Look no further! This post talks about PKCS#11, Cryptoki and demonstrates practically how to use PKCS#11 tokens to achieve mutual TLS authentication.

Raspberry Pi + ATECC608: Part 1 – Overcoming Modern IoT Security Challenges

Embedded systems are tough. Implementing security the right way is even tougher for such systems. Let us look at how a hardware security chip can help address the challenges in connected IoT nodes.

Embedded Security #4 – Diversify Everything!

Diversification is at the heart of a lot of commercially successful embedded systems. However, it is not very well understood. Let us attempt to understand what it is all about...