In this article, we will learn how asymmetric-key encryption and digital signatures work from a practical perspective.
[Read More]
A hands-on approach to symmetric-key encryption
In this article, we will learn how symmetric-key encryption works from a practical perspective.
[Read More]
Introduction to encryption for embedded Linux developers
This article is an introduction to encryption for embedded Linux developers.
[Read More]
What differs Android from other Linux based systems?
This article is an introduction to embedded Android from the perspective of an embedded Linux developer.
[Read More]
Introduction to Embedded Linux Security - part 2
This is the second part of the article about embedded Linux security.
[Read More]
Introduction to Embedded Linux Security - part 1
This article is going to be an introduction to embedded Linux security.
[Read More]
Material of my talk at Embedded Online Conference 2020
The Embedded Online Conference is an online conference for embedded systems, DSP, machine learning and FPGA engineers and it is starting today May 20th 2020.
[Read More]
How is the Linux kernel tested?
Have you ever wondered how the Linux kernel is tested?
[Read More]
Introduction to Trusted Execution Environment and ARM's TrustZone
A Trusted Execution Environment (TEE) is an environment where the code executed and the data accessed is isolated and protected in terms of confidentiality (no one have access to the data) and integrity (no one can change the code and its behavior).
[Read More]
Slides of my talk at Embedded World 2020
Last week, from February 25th to 27th in Nuremberg, Germany, we had another edition of Embedded World, the leading international fair for embedded systems.
[Read More]