BeagleBadge wearable platform boasts TI AM62L SoC, ePaper display, and Linux support
BeagleBadge wearable platform boasts TI AM62L SoC, ePaper display, and Linux support
Working With STM32 Arm TrustZone-Based Projects in CLion
#Clang #CLion #Tipstricks #Arm #Stm32 #Stm32cubemx #Trustzone
https://blog.jetbrains.com/clion/2026/03/working-with-stm32-arm-trustzone-in-clion/

In my day job and free time I frequently find myself debugging Arm Cortex-M microcontrollers (MCUs). In recent years, it has become more and more common for the cores in these MCUs to implement Armv8-M, with the Arm Cortex-M33 being a very popular variant. Armv8-M includes an optional security extension (Cortex-M Security Extension or “CMSE”), which is more commonly known by its marketing name, TrustZone. The security extension allows for a core, or a Processing Element (PE) if using the official terminology in Arm reference manuals, to divide memory into Secure and Non-Secure regions.
At BlackAlps, Marcel Busch and Philip Mao show how forgetting to check input types in the trusted apps of TrustZone leads to memory read/write.
Exploiting Android Linux kernel from Qualcomm Trustzone (QSEE) (CVE-2021-1961)
https://tamirzb.com/attacking-android-kernel-using-qualcomm-trustzone
Credits Tamir Zahavi-Brunner
A few years old but still an interesting blog post showing how to attack Mobile Trusted Execution Environments (ARM TrustZone) to extract biometric data
https://www.synopsys.com/blogs/software-security/cve-2020-7958-trustlet-tee-attack.html
Anyone here who has experience with bare-metal programming TrustZone-M applications for Nordic platforms? I have problems configuring my NSC region and I can't figure out what's wrong 😫
(please boost, I need this)
Update: Found the problem, it works now!
A few years old but still an interesting blog post showing how to attack Mobile Trusted Execution Environments (ARM TrustZone) to extract biometric data
https://www.synopsys.com/blogs/software-security/cve-2020-7958-trustlet-tee-attack.html