bp11

Stack and Stick are in Stock

Author: Aljosa Pasic, Senior Consultant at EvidenThe first half of the CROSSCON project is about to finish, and it is time to show what do we have in stock. The CROSSCON is a research project…
bp-10

Embracing fTPM on embedded ARM Devices: Insights and Solutions

Author: Tymoteusz Burak, Junior Embedded Systems Developer at 3mdeb In the realm of digital security, Trusted Platform Modules (TPMs) play a pivotal role by safeguarding cryptographic keys and…
bp9

Trust as a Foundation for Secure Internet of Things Services

Authors: Peter Ten, Research Assistant at University of WürzburgLukas Petzi, Research Assistant at University of Würzburg The Role of Trust on Internet of Things DevicesIn the rapidly…
bp8

Ensuring the Integrity of IoT Devices: Best Practices for Secure Firmware Updates

Author: Ákos Milánkovich, Security Analyst at SEARCH-LAB The Internet of Things (IoT) has become an integral part of our daily lives, offering unprecedented convenience and efficiency.…
bp7

FPGA-based Trusted Execution Environments and Their Use Cases

Authors: Shaza Zeitouni, Postdoctoral Researcher at TU DarmstadtHuimin Li, PhD Student at TU Delft Field Programmable Gate Arrays (FPGAs) represent a category of integrated circuits (ICs)…
BP6

Information Flow Tracking: Enhancing Data Security and Privacy

Author: Jure Mihelič, Beyond Semiconductor In this blog post, we explore the concept of information flow tracking (IFT) from the field of computer security and its importance in enhancing data…
bp-5

Enhancing IoT Security through Device-to-Device Authentication

Author: Rafał Kochanowski, 3mdeb In the contemporary digital realm, the principle of multi-factor authentication (MFA) has become a cornerstone, especially in sectors like banking. Traditionally…
BLOG-POST-4

Cybersecurity is a Community Effort

Author: David Purón, Barbara IoT  Undoubtedly, deploying Internet of Things (IoT)-connected devices, whether they are sensors, edge gateways, or large equipment, presents significant…
bp3

Enhancing Security in Agricultural UAVs: The Power of Remote Attestation

Author: Malvina Catalano, CYSEC In today's modern agricultural landscape, Unmanned Aerial Vehicles (UAVs), commonly known as agricultural drones, are revolutionizing the way farmers operate.…
silver-bullets

TEEs are not Silver Bullets

Author: David Cerdeira, University of Minho Trusted Execution Environments (TEEs) are secure execution environments that provide hardware-based isolation and protection for Trusted Applications…