YoVDO

TEEP Implementation on RISC-V Keystone and Arm TrustZone

Offered By: Linux Foundation via YouTube

Tags

Trusted Execution Environment Courses Cybersecurity Courses Embedded Systems Courses Computer Architecture Courses RISC-V Courses ARM TrustZone Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the implementation of TEEP (Trusted Execution Environment Provisioning) on RISC-V Keystone and Arm TrustZone in this 42-minute conference talk presented by Akira Tsukamoto and Kuniyasu Suzaki from The National Institute of Advanced Industrial Science and Technology (AIST). Gain insights into the Keystone project on RISC-V, use cases of Trusted Applications, and a simplified TEEP overview. Delve into the initial prototype of TEEP on ARM Cortex-A and the current TEEP implementation on RISC-V. Learn about CBOR expressions and their role in the process. Understand the importance of Trusted Execution Environments (TEEs) and their provisioning in modern computing systems.

Syllabus

Intro
Introduction of TEE
Keystone project on RISC-V
Use cases of Trusted Applications
Simplified TEEP overview
Initial prototype of TEEP on ARM Cortex-A
Current TEEP implementation on RISC-V
CBOR expressions
Summary


Taught by

Linux Foundation

Tags

Related Courses

Computer Architecture
Princeton University via Coursera
Introduction to Computer Architecture
Carnegie Mellon University via Independent
Build a Modern Computer from First Principles: From Nand to Tetris (Project-Centered Course)
Hebrew University of Jerusalem via Coursera
计算机系统基础(一) :程序的表示、转换与链接
Nanjing University via Coursera
Computer Architecture
Indian Institute of Technology Madras via Swayam