Skip to content
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
42 lines (42 sloc) 1.93 KB
categories description image session_attendee_num session_id session_room session_slot session_speakers session_track tag tags title youtube_video_url amazon_s3_presentation_url amazon_s3_video_url
Debugging trusted applications (and OP-TEE itself) can be difficult because, for very good reasons, secure software is often reluctant to disclose information about its operation to the non-secure world, meaning is does not have access to the rich facilities in operating systems such as GNU/Linux that would normally be used for system level debug.<br /> <br /> In this session we will discuss the common debug techniques used to debug secure applications. We will also look at how it is possible to implement function tracing to help solve problems, especially on platforms where JTAG debug is unavailable.
featured path
Keynote Room (World Ballroom BC)
end_time start_time
2019-04-04 12:55:00
2019-04-04 12:30:00
speaker_bio speaker_company speaker_image speaker_location speaker_name speaker_position speaker_username
Currently working as part of Support and Solutions team, Linaro. Responsible for activities related to platform security like OP-TEE, trusted firmware, boot-loaders etc. Also responsible for tool-chain support activities.<br><br>Contributed in various open source projects like OP-TEE, TF-A, u-boot, edk2, Linux etc.<br><br>Apart form technical stuff, I have keen interest in sports like badminton, table tennis, chess etc.
Sumit Garg
Software Engineer
BKK19-419 - Debugging with OP-TEE
You can’t perform that action at this time.