TEEP Implementation on RISC-V Keystone and Arm TrustZone
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the implementation of TEEP (Trusted Execution Environment Provisioning) on RISC-V Keystone and Arm TrustZone in this 42-minute conference talk presented by Akira Tsukamoto and Kuniyasu Suzaki from The National Institute of Advanced Industrial Science and Technology (AIST). Gain insights into the Keystone project on RISC-V, use cases of Trusted Applications, and a simplified TEEP overview. Delve into the initial prototype of TEEP on ARM Cortex-A and the current TEEP implementation on RISC-V. Learn about CBOR expressions and their role in the process. Understand the importance of Trusted Execution Environments (TEEs) and their provisioning in modern computing systems.
Syllabus
Intro
Introduction of TEE
Keystone project on RISC-V
Use cases of Trusted Applications
Simplified TEEP overview
Initial prototype of TEEP on ARM Cortex-A
Current TEEP implementation on RISC-V
CBOR expressions
Summary
Taught by
Linux Foundation
Tags
Related Courses
Systems & Networks Seminar - Andrew Bauman - Komodo: Using Verification to Disentangle Secure-Enclave Hardware from SoftwarePaul G. Allen School via YouTube fTPM - A Software-Only Implementation of a TPM Chip
USENIX via YouTube Trusted Execution Environments - A Technical Overview of Intel SGX, Arm TrustZone, and RISC-V PMP
Linux Foundation via YouTube Forging the USB Armory
44CON Information Security Conference via YouTube RT-TEE - Real-time System Availability for Cyber-physical Systems using ARM TrustZone
IEEE via YouTube