This is an automated email from the ASF dual-hosted git repository.
mssun pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/incubator-teaclave-website.git
The following commit(s) were added to refs/heads/master by this push:
new c49cb3b Update 2021-03-15-welcome-rust-optee-trustzone-sdk.md
c49cb3b is described below
commit c49cb3be3e991fe3c86b1adcbb9436b9033d4102
Author: Qinkun Bao <[email protected]>
AuthorDate: Mon Mar 15 19:00:38 2021 -0400
Update 2021-03-15-welcome-rust-optee-trustzone-sdk.md
---
site/blog/2021-03-15-welcome-rust-optee-trustzone-sdk.md | 14 +++++++-------
1 file changed, 7 insertions(+), 7 deletions(-)
diff --git a/site/blog/2021-03-15-welcome-rust-optee-trustzone-sdk.md
b/site/blog/2021-03-15-welcome-rust-optee-trustzone-sdk.md
index 513ef2b..6c86954 100644
--- a/site/blog/2021-03-15-welcome-rust-optee-trustzone-sdk.md
+++ b/site/blog/2021-03-15-welcome-rust-optee-trustzone-sdk.md
@@ -10,7 +10,7 @@ TrustZone is a security feature by ARM SoC to provide a
trusted execution
environment to protect areas like mobile computing, edge computing, and
emerging confidential computing, supporting scenarios like payments, key
management, model protection, etc. However, one major security threat in
-TrustZone applications is from the memory safety issue. For instance, a
+TrustZone applications is the memory safety issue. For instance, a
vulnerability of Qualcomm's QSEE is caused by the memory safety issue [1].
Attackers can even get the full-disk encryption key by exploiting such kind of
vulnerability [2].
@@ -27,12 +27,12 @@ TrustZone's foundation, Baidu has donated Rust OP-TEE
TrustZone SDK to Apache So
Foundation as a subproject of Teaclave, and renamed it as Teaclave TrustZone
SDK.
The location of new repository is
[https://github.com/apache/incubator-teaclave-trustzone-sdk](https://github.com/apache/incubator-teaclave-trustzone-sdk).
-Similar with Teaclave SGX SDK, Teaclave TrustZone SDK will be the foundation of
+Similar to Teaclave SGX SDK, Teaclave TrustZone SDK will be the foundation of
Teaclave FaaS platform to support multiple trusted execution environments.
## Design and Implementation of Teaclave TrustZone SDK
-Based on the GlobalPlatform's C APIs, Teaclave TrustZone SDK provides a safer
Rust interfaces.
+Based on the GlobalPlatform's C APIs, Teaclave TrustZone SDK provides safer
Rust interfaces.
With the SDK, TrustZone apps will not be affected by any memory safety issues
caused by the Rust's strong type system.
@@ -52,16 +52,16 @@ Rust APIs have clearer semantics and more strict type
checking.

-The project also has 13 samples including encryption/decryption, secure
storage, HOTP, etc.
-Also, we also provide a message passing sample code by using `serde` for
+The project also has 13 samples, including encryption/decryption, secure
storage, HOTP, etc.
+Also, we provide a message passing sample code by using `serde` for
serialization and de-serialization between different worlds to avoid any
-security issues caused by in-proper design in boundaries.
+security issues caused by improper design in boundaries.
## Getting Started and Documentations
All APIs in Teaclave TrustZone SDK are well documented. In the project's Wiki
page, we have [a quick-start
document](https://github.com/apache/incubator-teaclave-trustzone-sdk/wiki/Getting-started-with-OPTEE-for-QEMU-ARMv8)
-to guide you compiling and running a TrustZone app in QEMU emulator.
+to guide you compiling and running a TrustZone app in QEMU emulators.
You can find more design and performance evaluation in our paper published in
ACSAC 2020.

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]