This is an old revision of the document!


03 - Trusted Execution

Objectives

  • Modern software complexity → cyuber security issues;
  • Trusted Execution Environments and their application;
  • ARM's trusted boot process & the TrustZone architecture;
  • Install OP-TEE trusted operating system within ARM CPU's secure domain;
  • Build & run trusted applications;

Contents

Lecture

Before beginning the tasks, please check out the lecture slides & notes here.

Tasks

These tasks assume you have a proper boot image + base Linux system working (U-Boot SPL + ARM TrustedFirmware-A + Normal U-Boot, Linux Kernel + Buildroot filesystem).

We will continue writing the build scripts (Makefile-based) to augment our firmware boot package with a freshly compiled OP-TEE (BL32), modify ATF / TF-A (BL31) to load OP-TEE and, finally, write our own Trusted Applications and deploy them on our boards (with the help of our previously bootstrapped Linux, ofc.)!

ass/laboratoare/03.1690195798.txt.gz · Last modified: 2023/07/24 13:49 by radu.mantu
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0