Do you know there is a dedicated partition in the eMMC called RPMB that makes it possible to store data with integrity and authenticity support?
[Read More]
Introduction to SBOM management on embedded Linux
In this article, we will learn the basic concepts of SBOM (Software Bill of Materials) and how it can be generated and managed on embedded Linux with the Yocto Project.
[Read More]
Asymmetric-Key Encryption and Digital Signatures in Practice
In this article, we will learn how asymmetric-key encryption and digital signatures work from a practical perspective.
[Read More]
A hands-on approach to symmetric-key encryption
In this article, we will learn how symmetric-key encryption works from a practical perspective.
[Read More]
Introduction to encryption for embedded Linux developers
This article is an introduction to encryption for embedded Linux developers.
[Read More]
Introduction to Embedded Linux Security - part 2
This is the second part of the article about embedded Linux security.
[Read More]
Introduction to Embedded Linux Security - part 1
This article is going to be an introduction to embedded Linux security.
[Read More]
Introduction to Trusted Execution Environment and ARM's TrustZone
A Trusted Execution Environment (TEE) is an environment where the code executed and the data accessed is isolated and protected in terms of confidentiality (no one have access to the data) and integrity (no one can change the code and its behavior).
[Read More]
Extracting firmware from devices using JTAG
JTAG is a physical hardware interface that makes it possible, among other things, to extract the firmware image from electronic devices.
[Read More]
Reverse engineering my router's firmware with binwalk
A few days ago I decided to reverse engineer my router’s firmware image with binwalk.
[Read More]