security 12
View all
What are random numbers and how they are managed on Linux?
Introduction to TPM (Trusted Platform Module)
RPMB, a secret place inside the eMMC
Introduction to SBOM management on embedded Linux
Asymmetric-Key Encryption and Digital Signatures in Practice
A hands-on approach to symmetric-key encryption
Introduction to encryption for embedded Linux developers
Introduction to Embedded Linux Security - part 2
Introduction to Embedded Linux Security - part 1
Introduction to Trusted Execution Environment and ARM's TrustZone
Extracting firmware from devices using JTAG
Reverse engineering my router's firmware with binwalk
linux 11
View all
What are random numbers and how they are managed on Linux?
Debugging the Linux kernel with GDB
Introduction to TPM (Trusted Platform Module)
RPMB, a secret place inside the eMMC
Introduction to encryption for embedded Linux developers
Introduction to Embedded Linux Security - part 2
Introduction to Embedded Linux Security - part 1
How is the Linux kernel tested?
Using containers on embedded Linux
Introduction to Linux containers
Linux kernel GPIO user space interface