Главная
Study mode:
on
1
Intro
2
Introduction of TEE
3
Keystone project on RISC-V
4
Use cases of Trusted Applications
5
Simplified TEEP overview
6
Initial prototype of TEEP on ARM Cortex-A
7
Current TEEP implementation on RISC-V
8
CBOR expressions
9
Summary
Description:
Explore the implementation of TEEP (Trusted Execution Environment Provisioning) on RISC-V Keystone and Arm TrustZone in this 42-minute conference talk presented by Akira Tsukamoto and Kuniyasu Suzaki from The National Institute of Advanced Industrial Science and Technology (AIST). Gain insights into the Keystone project on RISC-V, use cases of Trusted Applications, and a simplified TEEP overview. Delve into the initial prototype of TEEP on ARM Cortex-A and the current TEEP implementation on RISC-V. Learn about CBOR expressions and their role in the process. Understand the importance of Trusted Execution Environments (TEEs) and their provisioning in modern computing systems.

TEEP Implementation on RISC-V Keystone and Arm TrustZone

Linux Foundation
Add to list
0:00 / 0:00