OP-TEE is Ready: Let's Use It! - Rouven Czerwinski, Pengutronix e.K.
#Hacktivity2022 // Fuzzing Trusted Applications in OP-TEE via Shared Memory by Roland Nagy
HOWTO build a product with OP-TEE
OP-TEE - Using TrustZone to Protect Our Own Secrets - Marc Kleine-Budde, Pengutronix e.K.
OP-TEE: When Linux Loses Control - Clément Léger, Bootlin
HKG15-311: OP-TEE for Beginners and Porting Review
HKG15-307: OP-TEE paging
Rusty OP-TEE Trusted Applications - Sumit Garg, Qualcomm Inc.
OP-TEE: Using the ARM Trust-Zone to Control Tamper Resistant Processors - Jorge Ramirez-Ortiz
A Journey To the Secure World of OPTEE From the Non-secure World of Linux - Manorit Chawdhry
Porting and running OP-TEE on ARMv8 devices
2 Much on My Mind – O.P TEE (Prod. by HYDRO | Vocals by @SONPRODUCTIONS)
LCU14-107: OP-TEE on ARMv8
SFO15 503 Secure storage in OP-TEE
BKK19-415 - OP-TEE: Shared memory between TAs
OP TEE Overview by Linaro Security Group
SAN19-411 Runtime Secure Keys in OP-TEE
HOWTO build a product with OP TEE
Enhancing OP-TEE for RISC-V: Leveraging IOPMP and Enabling RTOS Integration - Bing Yu
LCU14-302: OP-TEE Porting and Future Enhancements
Time 4 U – O.P TEE (Prod. by TurQuoise Dubb | Vocals by @SONPRODUCTIONS)
OP-TEE Trusted Apps: Wybór sprzętu i budowanie Linuxa | STM32MP2
Linaro OP-TEE open-source security for the mass-market
Lightning Talk: A Trusted OS for RISC-V ? OP-TEE is a Candidate - Marouene Boubakri, NXP
[ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems