![newsletter-2](/sites/crosscon/files/public/styles/large/public/content-images/media/2024/PAGE-0-COVER-BANNER.png?itok=Xd_FXFSS)
CROSSCON Newsletter #2
Online
![crosscon-necs](/sites/crosscon/files/public/styles/large/public/content-images/media/2024/NECS-CROSSCON.png?itok=DDqBRKvi)
CROSSCON Workshop - Security Services for Connected Devices
Cortina d’Ampezzo, Italy
![NECS2024](/sites/crosscon/files/public/styles/large/public/content-images/media/2024/Untitled-1.png?itok=CQiMt1nH)
NECS – PhD Winter School 2024
Cortina d’Ampezzo, Italy
![bao-workshop](/sites/crosscon/files/public/styles/large/public/content-images/media/2024/CROSSCON-BAO.png?itok=UGDxJ6CH)
Bao - Virtual Worshop
Online
![bp8](/sites/crosscon/files/public/styles/large/public/content-images/media/2023/BP-8.png?itok=4ptw1fMV)
Ensuring the Integrity of IoT Devices: Best Practices for Secure Firmware Updates
Author: Ákos Milánkovich, Security Analyst at SEARCH-LAB The Internet of Things (IoT) has become an integral part of our daily lives, offering unprecedented convenience and efficiency.…
![bp7](/sites/crosscon/files/public/styles/large/public/content-images/media/2023/BP-7.png?itok=Atl5_CPy)
FPGA-based Trusted Execution Environments and Their Use Cases
Authors: Shaza Zeitouni, Postdoctoral Researcher at TU DarmstadtHuimin Li, PhD Student at TU Delft Field Programmable Gate Arrays (FPGAs) represent a category of integrated circuits (ICs)…
![synergies](/sites/crosscon/files/public/styles/large/public/content-images/media/2024/1697624402241.jpeg?itok=-s3U_W1v)
SYNERGIES: Cyber Security and Data Protection Cluster
Caparica, Portugal
![bp6-2](/sites/crosscon/files/public/styles/large/public/content-images/media/2024/BP-6-2.png?itok=I-12PwAN)
Information Flow Tracking: Enhancing Data Security and Privacy
Author: Jurij Mihelič, Beyond Semiconductor In this blog post, we explore the concept of information flow tracking (IFT) from the field of computer security and its importance in enhancing data…