bp17

Ensuring Memory Safety for Trusted Applications through Secure Compilation

Author: Alberto Tacchella, Post-doctoral at Uni. Trento A Trusted Application (TA) is an application running in a Trusted Execution Environment (TEE) that implements a security-critical…
bp17

TEE vulnerabilities, are you still there?

Author: João Sousa, University of Minho TrustZone is an Arm hardware technology widely adopted in billions of mobile devices [2] and, more recently, in industrial control systems [3] and servers…
bp16

Challenges of Embedding Security in IoT Devices

Author: Malvina Catalano Gonzaga, CYSEC IntroductionThe Internet of Things (IoT) has revolutionized the way we interact with technology, embedding connectivity into everyday objects and systems…
bp15

Secure-by-formal-design

Author: Jurij Mihelič, Beyond Semiconductor Secure-by-formal-design: Towards better software and hardware assuranceDeveloping and building a cross-platform open security stack for connected…
BP-14

Improving the resilience of trusted applications with control flow integrity

Author: Alberto Tacchella, Post-doctoral at Uni. Trento Improving the resilience of trusted applications with control flow integrityOne of the targets of the CROSSCON project is the development…
bp13

Using IEC-62443 to Secure Industrial Devices

Author: Ainara García, Project Manager PMO at Barbara IoT Using IEC-62443 to Secure Industrial DevicesIn the era of Industry 4.0, the convergence of Information Technology (IT) and Operational…
bp11

Stack and Stick are in Stock

Author: Aljosa Pasic, Senior Consultant at EvidenThe first half of the CROSSCON project is about to finish, and it is time to show what do we have in stock. The CROSSCON is a research project…
bp-10

Embracing fTPM on embedded ARM Devices: Insights and Solutions

Author: Tymoteusz Burak, Junior Embedded Systems Developer at 3mdeb In the realm of digital security, Trusted Platform Modules (TPMs) play a pivotal role by safeguarding cryptographic keys and…
bp9

Trust as a Foundation for Secure Internet of Things Services

Authors: Peter Ten, Research Assistant at University of WürzburgLukas Petzi, Research Assistant at University of Würzburg The Role of Trust on Internet of Things DevicesIn the rapidly…
bp8

Ensuring the Integrity of IoT Devices: Best Practices for Secure Firmware Updates

Author: Ákos Milánkovich, Security Analyst at SEARCH-LAB The Internet of Things (IoT) has become an integral part of our daily lives, offering unprecedented convenience and efficiency.…