Collection of material for learning ARM TrustZone.
- BlockChain
- EMULATOR
- MachineLearning
- NETWORK
- Exploit
- SDK
- Samples
- Study
- Security
- Tool&&DEBUG
- OperatingSystem
- Miraje/TrustZone-backed-Bitcoin-Wallet - Hardware Bitcoin Wallet.
- tzvisor/ltzvisor - LTZVisor: a Lightweight TrustZone-assisted Hypervisor
- mofanv/darknetz - runs several layers of a deep learning model in TrustZone.
- henrydcase/TEE-TLS-delegator - Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment.
- laginimaineb/MSM8974_exploit - Full TrustZone exploit for MSM8974.
- laginimaineb/cve-2016-2431 - Qualcomm TrustZone kernel privilege escalation.
- retme7/mate7_TZ_exploit - Huawei mate 7 TrustZone exploit.
- RKX1209/CVE-2019-1010298 - Proof of Concept of TrustZone exploit.
- ningzhenyu/nailgun - Nailgun attack on ARM devices.
- mesalock-linux/rust-optee-trustzone-sdk - Rust OP-TEE TrustZone SDK: Enabling Safe, Functional, and Ergonomic Development of Trustlets.
- sccommunity/rust-optee-trustzone-sdk - Rust OP-TEE TrustZone SDK: Enabling Safe, Functional, and Ergonomic Development of Trustlets.
- openenclave/openenclave - SDK for developing enclaves https://openenclave.io/sdk/.
- yingkailiang/TrustZoneHelloworld - Trustzone vexpress helloworld example.
- OpenEnclave TrustZone Test
- linaro-swg/optee_examples - OP-TEE Sample Applications.
- ARM TRUSTZONE - Arm TrustZone technology official website.
- OP-TEE Documentation - Official location for OP-TEE documentation.
- OpenEnclave TrustZone Introduction
- kkamagui/shadow-box-for-arm - Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018).
- mdenzel/self-healing_FreeRTOS - A self-healing FreeRTOS based on ARM TrustZone.
- Samsung/mTower - mTower is Trusted Execution Environment specially designed to be used on MicroController Units (MCUs) supporting ARM TrustZone technology.
- liwenhaosuper/t6 - T6: An operating system for TrustZone based Trusted Execution Environment(TEE) in ARM-based systems.
- quarkslab/samsung-trustzone-research - Reverse-engineering tools and exploits for Samsung's implementation of TrustZone.
- bkerler/tee_research - Some useful ida and ghidra plugins for tee research.
- microsoft/Komodo - Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone.
- nccgroup/cachegrab - a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 cores.
- OP-TEE/optee_os - OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology.
- WUSTL-CSPL/RT-TEE - RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone.