TEEP Implementation on RISC-V Keystone and Arm TrustZone
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the implementation of TEEP (Trusted Execution Environment Provisioning) on RISC-V Keystone and Arm TrustZone in this 44-minute conference talk presented by Akira Tsukamoto and Kuniyasu Suzaki from The National Institute of Advanced Industrial Science and Technology (AIST). Gain insights into the technical aspects of secure provisioning for trusted execution environments across different hardware architectures. Learn about the challenges and solutions in implementing TEEP on both RISC-V and Arm platforms, and understand the implications for enhancing security in embedded systems and IoT devices.
Syllabus
TEEP Implementation on RISC-V Keystone and Arm TrustZone
Taught by
Linux Foundation
Tags
Related Courses
IoT Product SecurityCybrary Trusted Execution Environments Meet the Blockchain
Simons Institute via YouTube Cache Side Channel Attack - Exploitability and Countermeasures
Black Hat via YouTube Confidential Computing in Cloud and Edge
RSA Conference via YouTube The Rise of Confidential Computing
RSA Conference via YouTube