
    

    <?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2-ppt DokuWiki" -->
<?xml-stylesheet href="http://ocw.cs.pub.ro/courses/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="http://ocw.cs.pub.ro/courses/feed.php">
        <title>CS Open CourseWare ass:cursuri:03:theory</title>
        <description></description>
        <link>http://ocw.cs.pub.ro/courses/</link>
        <image rdf:resource="http://ocw.cs.pub.ro/courses/lib/tpl/arctic/images/favicon.ico" />
       <dc:date>2026-05-18T08:22:30+03:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/ass/cursuri/03/theory/01?rev=1689498849&amp;do=diff"/>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/ass/cursuri/03/theory/02?rev=1689498862&amp;do=diff"/>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/ass/cursuri/03/theory/03?rev=1689498874&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="http://ocw.cs.pub.ro/courses/lib/tpl/arctic/images/favicon.ico">
        <title>CS Open CourseWare</title>
        <link>http://ocw.cs.pub.ro/courses/</link>
        <url>http://ocw.cs.pub.ro/courses/lib/tpl/arctic/images/favicon.ico</url>
    </image>
    <item rdf:about="http://ocw.cs.pub.ro/courses/ass/cursuri/03/theory/01?rev=1689498849&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-07-16T12:14:09+03:00</dc:date>
        <title>Trusted Execution Environments</title>
        <link>http://ocw.cs.pub.ro/courses/ass/cursuri/03/theory/01?rev=1689498849&amp;do=diff</link>
        <description>Trusted Execution Environments

A Trusted Execution Environment (TEE) is an isolated execution context whose internal state (memory, CPU registers etc.) is secured and cannot be reached by normal software.
This means untrusted applications, and even the highly-privileged Operating System (often considered as being vulnerable to cyber attacks due to its huge complexity) cannot read / write a TEE's protected zones and cannot access secure peripherals (e.g., keypads for sensitive input, protected s…</description>
    </item>
    <item rdf:about="http://ocw.cs.pub.ro/courses/ass/cursuri/03/theory/02?rev=1689498862&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-07-16T12:14:22+03:00</dc:date>
        <title>ARM Security Extensions (TrustZone)</title>
        <link>http://ocw.cs.pub.ro/courses/ass/cursuri/03/theory/02?rev=1689498862&amp;do=diff</link>
        <description>ARM Security Extensions (TrustZone)

Modern ARM CPU architectures feature the TrustZone Security Extensions (starting with armv7 for ARM Cortex-A, expanding to Cortex-Ms after v8), which introduces the necessary execution context separation required for implementing TEEs, adding a new Secure World and keeping the previous domain as Non-Secure World.</description>
    </item>
    <item rdf:about="http://ocw.cs.pub.ro/courses/ass/cursuri/03/theory/03?rev=1689498874&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-07-16T12:14:34+03:00</dc:date>
        <title>OP-TEE</title>
        <link>http://ocw.cs.pub.ro/courses/ass/cursuri/03/theory/03?rev=1689498874&amp;do=diff</link>
        <description>OP-TEE

OP-TEE (Open Trusted Execution Environment) is a open-source project which aims to implement a complete Secure Operating System to run inside ARM TrustZone-enabled Secure World and facilitate the development of Trusted Applications (TAs).

OP-TEE's main components are:</description>
    </item>
</rdf:RDF>
