sergioprado.blog
  • Home
  • Training
  • Talks
  • Newsletter
  • About Me
sergioprado.blog

Tags


security 12

View all
What are random numbers and how they are managed on Linux? Introduction to TPM (Trusted Platform Module) RPMB, a secret place inside the eMMC Introduction to SBOM management on embedded Linux Asymmetric-Key Encryption and Digital Signatures in Practice A hands-on approach to symmetric-key encryption Introduction to encryption for embedded Linux developers Introduction to Embedded Linux Security - part 2 Introduction to Embedded Linux Security - part 1 Introduction to Trusted Execution Environment and ARM's TrustZone Extracting firmware from devices using JTAG Reverse engineering my router's firmware with binwalk

linux 11

View all
What are random numbers and how they are managed on Linux? Debugging the Linux kernel with GDB Introduction to TPM (Trusted Platform Module) RPMB, a secret place inside the eMMC Introduction to encryption for embedded Linux developers Introduction to Embedded Linux Security - part 2 Introduction to Embedded Linux Security - part 1 How is the Linux kernel tested? Using containers on embedded Linux Introduction to Linux containers Linux kernel GPIO user space interface

events 5

View all
Material of my talk at Embedded Online Conference 2020 Slides of my talk at Embedded World 2020 Embedded World 2020 Embedded Online Conference 2020 Slides and video of my talk at ELCE 2019

talks 5

View all
Material of my talk at Embedded Online Conference 2020 Slides of my talk at Embedded World 2020 Embedded World 2020 Embedded Online Conference 2020 Slides and video of my talk at ELCE 2019

debugging 4

View all
Debugging the Linux kernel with GDB Bug hunting with static analysis tools Finding memory bugs with AddressSanitizer Linux core dump analysis

c-language 2

View all
GCC extensions to the C language Finding memory bugs with AddressSanitizer

containers 2

View all
Using containers on embedded Linux Introduction to Linux containers

encryption 2

View all
Asymmetric-Key Encryption and Digital Signatures in Practice A hands-on approach to symmetric-key encryption

reverse-engineering 2

View all
Extracting firmware from devices using JTAG Reverse engineering my router's firmware with binwalk

android 1

View all
What differs Android from other Linux based systems?

cppcheck 1

View all
Bug hunting with static analysis tools

ftrace 1

View all
Tracing the Linux kernel with ftrace

gcc 1

View all
GCC extensions to the C language

gdb 1

View all
Linux core dump analysis

gpio 1

View all
Linux kernel GPIO user space interface

news 1

View all
A new blog about embedded systems

programming 1

View all
GCC extensions to the C language

tee 1

View all
Introduction to Trusted Execution Environment and ARM's TrustZone

testing 1

View all
How is the Linux kernel tested?

tracing 1

View all
Tracing the Linux kernel with ftrace

yocto-project 1

View all
Introduction to SBOM management on embedded Linux

Sergio Prado  •  2024  •  sergioprado.blog


This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License Creative Commons License