We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Secure boot, TEEs, different OSes and more

Formal Metadata

Title
Secure boot, TEEs, different OSes and more
Title of Series
Number of Parts
287
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
In this talk Marta is going to present a map of the trusted computing landscape, explaining different types hardware support. She is going to put it in a context of implementing secure boot and trusted execution in an embedded distribution, namely Yocto-based Eclipse Oniro project. The trusted computing landscape could be hard to understand for newcomers. Just at the beginning, they encounter a number of abbreviations like TEE, OPTEE, SEV, TF-A, TF-M and many more. In this talk Marta is going to present a map of those technologies, illustrate how they are (or are expected to) be used, which market needs they address. She will show how they could be implemented in practice in an embedded distribution. The example will be the secure boot work in the Eclipse Oniro project, an embedded multi-OS distribution for Internet of Things (IOT) devices. The multi-OS specificity of Oniro will be used how the trusted computing technologies compare on different types of processors running Linux and Zephyr, with different security hardware support.