
    

    <?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2-ppt DokuWiki" -->
<?xml-stylesheet href="http://ocw.cs.pub.ro/courses/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="http://ocw.cs.pub.ro/courses/feed.php">
        <title>CS Open CourseWare ass:labs-2025:05:tasks</title>
        <description></description>
        <link>http://ocw.cs.pub.ro/courses/</link>
        <image rdf:resource="http://ocw.cs.pub.ro/courses/lib/tpl/arctic/images/favicon.ico" />
       <dc:date>2026-04-08T04:13:21+03:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/ass/labs-2025/05/tasks/01?rev=1754637153&amp;do=diff"/>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/ass/labs-2025/05/tasks/02?rev=1754652522&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="http://ocw.cs.pub.ro/courses/lib/tpl/arctic/images/favicon.ico">
        <title>CS Open CourseWare</title>
        <link>http://ocw.cs.pub.ro/courses/</link>
        <url>http://ocw.cs.pub.ro/courses/lib/tpl/arctic/images/favicon.ico</url>
    </image>
    <item rdf:about="http://ocw.cs.pub.ro/courses/ass/labs-2025/05/tasks/01?rev=1754637153&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-08-08T10:12:33+03:00</dc:date>
        <title>01. [Re]Configuring &amp; building OP-TEE + ATF</title>
        <link>http://ocw.cs.pub.ro/courses/ass/labs-2025/05/tasks/01?rev=1754637153&amp;do=diff</link>
        <description>01. [Re]Configuring &amp; building OP-TEE + ATF

The initial step would be to embed OP-TEE OS into our firmware boot package and re-configure (and recompile) ARM Trusted Firmware-A to load it.

But first, we need to understand the memory organization of our board.
This is required since BL31 (TF-A) has to configure the TZASC peripheral to reserve a trusted region inside the main memory (DRAM) for use by our Secure OS &amp; TAs.</description>
    </item>
    <item rdf:about="http://ocw.cs.pub.ro/courses/ass/labs-2025/05/tasks/02?rev=1754652522&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-08-08T14:28:42+03:00</dc:date>
        <title>02. Writing Trusted Applications</title>
        <link>http://ocw.cs.pub.ro/courses/ass/labs-2025/05/tasks/02?rev=1754652522&amp;do=diff</link>
        <description>02. Writing Trusted Applications

In the second part of our lab, it's time to run some Trusted Applications (TAs)!

We will use the official optee_examples as starting point.

Two questions arise: how can one compile a TA? + how to test it on our board?</description>
    </item>
</rdf:RDF>
