Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for c trustzone
c
x
trustzone
x
9 search results found
Nailgun
⭐
116
Nailgun attack on ARM devices.
Multizone Sdk
⭐
74
MultiZone® Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn't define TrustZone-like primitives to provide hardware separation. To shield critical functionality from untrusted third-party components, MultiZone provides hardware-enforced, software-defined separation of multi
Shadow Box For Arm
⭐
57
Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)
Efficient Embedded Systems Design Education Kit
⭐
57
Design and program Arm-based embedded systems and implement them in low-level hardware using standard C and assembly language.
Ltzvisor
⭐
48
LTZVisor: a Lightweight TrustZone-assisted Hypervisor
Mtower
⭐
44
mTower is Trusted Execution Environment specially designed to be used on MicroController Units (MCUs) supporting ARM TrustZone technology (e.g., Cortex-M23/33/35p). mTower operates well under restrictions typical for such environment – small RAM and ROM sizes, relatively low performance, absence of rich OSes providing variety of services available on PCs or in enterprise environments. mTower is intended for usage in IoT, embedded devices, Smart Home applications, distributed heterogeneous networ
Multizone Iot Sdk
⭐
19
MultiZone® Trusted Firmware is the quick and safe way to build secure IoT applications with any RISC-V processor. It provides secure access to commercial and private IoT clouds, real-time monitoring, secure boot, and remote firmware updates. The built-in Trusted Execution Environment provides hardware-enforced separation ...
Multizone Sdk Arm
⭐
13
MultiZone® Security TEE for Arm® Cortex®-M is the quick and safe way to add security and separation to any Cortex-M based device. MultiZone® software can retrofit existing designs. If you don’t have TrustZone®, or if you require finer granularity than one secure world, you can take advantage of high security separation without the need for hardware and software redesign, eliminating the complexity associated with managing a hybrid hardware/software security scheme.
Tee Tls Delegator
⭐
8
Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment
Related Searches
C Kernel (12,842)
C Video Game (4,242)
C Driver (4,106)
Python C (4,069)
C Firmware (3,560)
C Arduino (3,118)
C Operating System (2,757)
C Arm (2,628)
C Usb (2,589)
C Command Line (2,475)
1-9 of 9 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.