Working With STM32 Arm TrustZone-Based Projects in CLion
#Clang #CLion #Tipstricks #Arm #Stm32 #Stm32cubemx #Trustzone
https://blog.jetbrains.com/clion/2026/03/working-with-stm32-arm-trustzone-in-clion/
Working With STM32 Arm TrustZone-Based Projects in CLion
#Clang #CLion #Tipstricks #Arm #Stm32 #Stm32cubemx #Trustzone
https://blog.jetbrains.com/clion/2026/03/working-with-stm32-arm-trustzone-in-clion/
🌘 使用 GDB 辨識 Arm Cortex-M 的當前安全狀態
➤ 透過堆疊指標數值比對,快速掌握 TrustZone 運行切換
✤ https://danielmangum.com/posts/arm-cortex-m-security-state-gdb/
在嵌入式系統開發中,調試具備 TrustZone(Armv8-M 安全擴充功能)的處理器(如 Arm Cortex-M33)常面臨一項挑戰:如何快速判斷處理器目前正處於「安全(Secure)」還是「非安全(Non-Secure)」狀態。開發者 Daniel Mangum 提供了一個簡潔高效的方案。由於處理器在不同安全狀態下會使用各自獨立的堆疊指標(Stack Pointer, SP),我們只需透過 GDB 同時讀取當前的 SP 以及各個堆疊指標變體(MSP_S, MSP_NS 等),並進行數值比對,就能即時揭示處理器的運行環境。這種方法在處理如 Zephyr RTOS 等複雜的多執行緒系統時,能顯著提升排錯效率。
+ 「這是在處理
#嵌入式系統 #Arm Cortex-M #GDB 調試 #TrustZone #韌體開發
Linux Kernel Explorer
https://reverser.dev/linux-kernel-explorer
#ycombinator #Android_security #penetration_testing #reverse_engineering #mobile_security #TrustZone #Play_Integrity #security_audit #device_farm_testing #bootloader_security #hardware_security #Android_pentesting #firmware_analysis #TEE_security #kernel_security #Android_hardening
If you need Secure Boot for STM32MP157 , we got you covered with STMP157-SOM-512-SB and STMP157-OLinuXino-LIME2H-SB now featuring STM32MP157FAA1 extended temperature range -20+105C running at 800Mhz and secure boot https://olimex.wordpress.com/2025/07/29/we-can-now-offer-version-of-smt32mp157-boards-with-secure-boot-and-aes256/ #stm32mp157 #secure #boot #trustzone
At BlackAlps, Marcel Busch and Philip Mao show how forgetting to check input types in the trusted apps of TrustZone leads to memory read/write.
Exploiting Android Linux kernel from Qualcomm Trustzone (QSEE) (CVE-2021-1961)
https://tamirzb.com/attacking-android-kernel-using-qualcomm-trustzone
Credits Tamir Zahavi-Brunner
A few years old but still an interesting blog post showing how to attack Mobile Trusted Execution Environments (ARM TrustZone) to extract biometric data
https://www.synopsys.com/blogs/software-security/cve-2020-7958-trustlet-tee-attack.html
Anyone here who has experience with bare-metal programming TrustZone-M applications for Nordic platforms? I have problems configuring my NSC region and I can't figure out what's wrong 😫
(please boost, I need this)
Update: Found the problem, it works now!
A few years old but still an interesting blog post showing how to attack Mobile Trusted Execution Environments (ARM TrustZone) to extract biometric data
https://www.synopsys.com/blogs/software-security/cve-2020-7958-trustlet-tee-attack.html
Intro to embedded systems security and TrustZone
https://embeddedsecurity.io
Trusted computing got a new coat of paint. Now it's called "confidential computing", and it's totally not about who controls the machine, not at all.
A talk at #rustlab2023 triggered me, so I had to rant about it on my blog. Sorry.
Digitalized some of my old notes...
Here is my documentation of which mode switches are possible in #arm #trustzone
Hope this helps someone :blobsmile: (wish I had that back in the days... yep, each of these arrows was a "flash SD-card, boot circuit board, check if LED lights up, repeat")
I was looking at arm microcontrollers for a project at work recently. This is not something I have done in a while. Some of the newer ones have features like page protection and secure enclave support that I’ve never seen at that level before. Seems like progress. #microcontroller #trustzone #iot
@ellenor I don’t need high performance so I use ~15 y.o. hardware that pre-dates the spy chips. But still my hardware was not targeted by #coreboot / #libreboot, so my firmware is non-free. I also have some newer hardware that I pulled out of dumpsters (thus did not contribute to the intel M.E./ AMD #trustzone spy chip market), which I just use for occasional experiments.
Cool guide to embedded systems security and ARM trustzone by @dim0x69
https://embeddedsecurity.io
very funny, when you want to do surveillance, name your solution so that it contains word #trust in it.
https://www.reddit.com/r/security/comments/4ot223/do_amdprocessors_have_something_like_intel/
#arm #amd #intel #intel_me #trustzone
yes, because the most widespread #os for #pc is #minix, if you did not know that.
it seems that my #pinebook with #rockchip chipset is pretty safe:
it has an #M0 that does power management, and there is #EL3 (exception level 3), which some people see in the same light. those are auditable from userspace and are probably safe.
Prevent spoofing of #IoT Actuation Commands with Arm #TrustZone on #RaspberryPi...
"Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks"
https://dl.acm.org/doi/pdf/10.1145/3338507.3358615