Ensuring Memory Safety for Trusted Applications through Secure Compilation
Author: Alberto Tacchella, Post-doctoral at Uni. Trento A Trusted Application (TA) is an application running in a Trusted Execution Environment (TEE) that implements a security-critical…
TEE vulnerabilities, are you still there?
Author: João Sousa, University of Minho TrustZone is an Arm hardware technology widely adopted in billions of mobile devices [2] and, more recently, in industrial control systems [3] and servers…
Challenges of Embedding Security in IoT Devices
Author: Malvina Catalano Gonzaga, CYSEC IntroductionThe Internet of Things (IoT) has revolutionized the way we interact with technology, embedding connectivity into everyday objects and systems…
Secure-by-formal-design
Author: Jurij Mihelič, Beyond Semiconductor Secure-by-formal-design: Towards better software and hardware assuranceDeveloping and building a cross-platform open security stack for connected…
Improving the resilience of trusted applications with control flow integrity
Author: Alberto Tacchella, Post-doctoral at Uni. Trento Improving the resilience of trusted applications with control flow integrityOne of the targets of the CROSSCON project is the development…
Using IEC-62443 to Secure Industrial Devices
Author: Ainara García, Project Manager PMO at Barbara IoT Using IEC-62443 to Secure Industrial DevicesIn the era of Industry 4.0, the convergence of Information Technology (IT) and Operational…
Stack and Stick are in Stock
Author: Aljosa Pasic, Senior Consultant at EvidenThe first half of the CROSSCON project is about to finish, and it is time to show what do we have in stock. The CROSSCON is a research project…
Embracing fTPM on embedded ARM Devices: Insights and Solutions
Author: Tymoteusz Burak, Junior Embedded Systems Developer at 3mdeb In the realm of digital security, Trusted Platform Modules (TPMs) play a pivotal role by safeguarding cryptographic keys and…
Trust as a Foundation for Secure Internet of Things Services
Authors: Peter Ten, Research Assistant at University of WürzburgLukas Petzi, Research Assistant at University of Würzburg The Role of Trust on Internet of Things DevicesIn the rapidly…
Ensuring the Integrity of IoT Devices: Best Practices for Secure Firmware Updates
Author: Ákos Milánkovich, Security Analyst at SEARCH-LAB The Internet of Things (IoT) has become an integral part of our daily lives, offering unprecedented convenience and efficiency.…