Главная
Study mode:
on
1
Introduction
2
Security vulnerabilities
3
Firmware as a target
4
Trusted Firmware Overview
5
Trusted Firmware Applications
6
Trusted Firmware A
7
Collaboration
8
TFA Tests
9
Hafnium
10
Architecture
11
Opti
12
Trusted Firmware M
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore the collaborative development of secure firmware in this 39-minute conference talk by Shebu Varghese Kuriakose and Matteo Carlini from Arm. Delve into the world of Trusted Firmware, examining its importance in addressing security vulnerabilities and protecting against firmware-targeted attacks. Gain insights into Trusted Firmware applications, with a focus on Trusted Firmware A (TFA) and its testing processes. Learn about the Hafnium architecture and its role in firmware security. Discover the principles behind OptiTrusted Firmware M and understand how this collaborative approach is shaping the future of secure firmware development in the tech industry.

Trusted Firmware - Building Secure Firmware Collaboratively

Linux Foundation
Add to list