298
edits
mNo edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
{{DISPLAYTITLE:Trusted Execution Environment (TEE)|noerror}} | {{DISPLAYTITLE:Trusted Execution Environment (TEE)|noerror}} | ||
== Trusted Execution Environment == | |||
When it comes to embedded systems, a Trusted Execution Environment or TEE, is a secure area of the system that is protected from the rest of the system using encryption. Data in q TEE can only be read or tampered with by authorized code outside the environment, which means that unauthorized pieces of software can not get data or execute programs that reside in the TEE. | |||
Applications that reside inside of a TEE are known as Trusted Applications or TAs. They are considered secure since they are encrypted to the outside world. This means that data handled by a TA can only be accessed by certain components of the system so data processed by a TA can not be manipulated or altered. | |||
TEE often relies in a hardware isolation mechanism to achieve the separation of the secure and non-secure worlds. TEE implementations in embedded systems are usually based on the [https://www.arm.com/technologies/trustzone-for-cortex-a Arm TrustZone] technology as it provide a low cost and efficient alternative to having a dedicated security core in an SoC. | |||
<noinclude> | <noinclude> |
edits