International Day of Families at HENSOLDT Cyber
International Day of Families at HENSOLDT Cyber Interview with Markus Wolf, Sascha Fedderwitz, Emilia Fries We asked some of our colleagues a few questions on
What exactly does the TRENTOS® SDK contain and what steps are required to set it up on a Linux development machine? With the start of our new video series, we aim to answer these questions by offering you a step-by-step tutorial that will take you through the installation process and all the contents that the SDK provides.
Get to know the exact contents of the SDK
If you have been following along with our previous blog posts that went into more detail on the principles and exceptionalism of the underlying seL4® microkernel and how a secure Operating System can be built on top of it with the TRENTOS® SDK , you might have started to get interested in what exactly this SDK is comprised of and how it will offer you an easy access to the development of seL4 based embedded systems.
What can you learn in our TRENTOS video tutorial sessions?
Instead of having this article go into lengthy details on every folder and every file that the SDK contains to provide a somewhat accurate description of its contents, we decided that this and some of our upcoming topics call for a more visual and hands-on approach. Hence this article along with the marks the beginning of our new video tutorial series.
In these tutorial sessions, we will go through all the contents of the SDK in a step-by-step manner. Starting by unpacking the SDK itself to building and running your first TRENTOS based system we will demonstrate to you, what you exactly can expect from the SDK and how it greatly lowers the entry barriers to the development of secure seL4 based systems.
Easy start with a highly transparent content overview
In the first video session, we will set up the SDK on a Linux development machine and familiarize ourselves with all the contents it provides. This should provide you with a highly transparent insight on what the product itself contains and which specific contents you might want to spend some time on to familiarize yourself with before you start developing your first secure seL4 based system.
So, enjoy the first session and get familiar with the exact contents of the TRENTOS SDK.
International Day of Families at HENSOLDT Cyber Interview with Markus Wolf, Sascha Fedderwitz, Emilia Fries We asked some of our colleagues a few questions on
How to mitigate hardware attacks? Written by Maja Malenko, Hardware Researcher at HENSOLDT Cyber In the final blog post of our hardware security trilogy, we
Is Hardware Reverse Engineering a Real Threat? Written by Maja Malenko, Hardware Researcher at HENSOLDT Cyber Today we are continuing the story of hardware security
Hardware Security: HENSOLDT Cyber’s MITHRIL Project Written by Maja Malenko, Hardware Researcher at HENSOLDT Cyber Creating secure hardware is a challenging task, especially in times
Successful ISO 9001:2015 certification We are pleased to announce that after eight months of hard work, preparation, and intensive teamwork, HENSOLDT Cyber has certified its
Hello Secure World – How to build and run your first secure TRENTOS® system Building on our first video session in which we took a
LEGAL:
CONTACT US:
FOLLOW US ON:
HEADQUARTER POSTAL ADDRESS:
OUR OFFICE IS LOCATED HERE: