This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.
-
Updated
Aug 12, 2021 - C
This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.
Tutorial and base project: TEE on AMD Zynq UltraScale+ using Arm TrustZone
A TEE solution for Raspberry Pi using OP-TEE, built on TF-A, U-Boot, and buildroot. This is our implementation to get a version of this working, and is not supported by the above projects.
DBStore trusted service and demo of the HCE Mobile Ticketing application
OAT (IEEE S&P 2020) control-flow attestation on Raspberry Pi 3 with ARM TrustZone / OP-TEE — LLVM IR compile-time instrumentation, SHA-256 hash chain, shadow stack for ROP detection, and offline verifier. Verified against paper Table III on syringe pump benchmark.
Practical group work made for Secure Execution Environments @ UA - Portugal.
Implementation of BLAST: Whole-Program Control-Flow Path Attestation (CCS 2023) on Raspberry Pi 3 with ARM TrustZone / OP-TEE
Testing the security of an OP-TEE installation
Example of an encrypted connection via TLS with mutual authentication using X.509 certificates
This project implements Control-Flow Attestation (C-FLAT) for embedded systems using ARM TrustZone, OP-TEE, and LLVM. It specifically targets the detection of runtime attacks such as Return-Oriented Programming (ROP) and non-control-data exploits in cyber-physical systems.
Add a description, image, and links to the op-tee topic page so that developers can more easily learn about it.
To associate your repository with the op-tee topic, visit your repo's landing page and select "manage topics."