This is part 4 in a series about OP-TEE, the trusted part of a secure linux implementation. In this part, we see how to write and build our first trusted application based on a simple example.
This is the part 3 in the series of posts about OP-TEE. In this post, we talk about how to set up and test OP-TEE on two very popularly used platforms - QEMU and Raspberry Pi 3.
This is the part 2 in the series of posts about OP-TEE. In this post, we talk about the various components of the OP-TEE project, what their roles are and finally touch up on Global Platform.
In order to enhance the cybersecurity of linux-based systems as well as to meet compliance requirements, more and more systems are making use of TEE or Trusted Execution Environment to implement security-critical functionality. Where does a beginner start? Read on..
Looking for a great introduction to the PKCS#11 standard? Look no further! This post talks about PKCS#11, Cryptoki and demonstrates practically how to use PKCS#11 tokens to achieve mutual TLS authentication.
Embedded systems are tough. Implementing security the right way is even tougher for such systems. Let us look at how a hardware security chip can help address the challenges in connected IoT nodes.
Diversification is at the heart of a lot of commercially successful embedded systems. However, it is not very well understood. Let us attempt to understand what it is all about...
Secure Embedded Systems need immutable boot code now more than ever...let us understand what it is!
Looking for a simple introduction to hardware root of trust in embedded systems? Read on...
A small glimpse into the vast world of embedded security...