bp7

FPGA-based Trusted Execution Environments and Their Use Cases

Authors: Shaza Zeitouni, Postdoctoral Researcher at TU DarmstadtHuimin Li, PhD Student at TU Delft Field Programmable Gate Arrays (FPGAs) represent a category of integrated circuits (ICs)…
BP6

Information Flow Tracking: Enhancing Data Security and Privacy

Author: Jure Mihelič, Beyond Semiconductor In this blog post, we explore the concept of information flow tracking (IFT) from the field of computer security and its importance in enhancing data…
ga-gmr

CROSSCON - 3rd GA Meeting (Portugal)

Guimarães, Portugal
bp-5

Enhancing IoT Security through Device-to-Device Authentication

Author: Rafał Kochanowski, 3mdeb In the contemporary digital realm, the principle of multi-factor authentication (MFA) has become a cornerstone, especially in sectors like banking. Traditionally…
BLOG-POST-4

Cybersecurity is a Community Effort

Author: David Purón, Barbara IoT  Undoubtedly, deploying Internet of Things (IoT)-connected devices, whether they are sensors, edge gateways, or large equipment, presents significant…
bp3

Enhancing Security in Agricultural UAVs: The Power of Remote Attestation

Author: Malvina Catalano, CYSEC In today's modern agricultural landscape, Unmanned Aerial Vehicles (UAVs), commonly known as agricultural drones, are revolutionizing the way farmers operate.…
r5

RISC-V Summit Europe 2023

Barcelona, Spain