FPGA-based Trusted Execution Environments and Their Use Cases
Authors: Shaza Zeitouni, Postdoctoral Researcher at TU DarmstadtHuimin Li, PhD Student at TU Delft Field Programmable Gate Arrays (FPGAs) represent a category of integrated circuits (ICs)…
SYNERGIES: Cyber Security and Data Protection Cluster
Caparica, Portugal
Information Flow Tracking: Enhancing Data Security and Privacy
Author: Jure Mihelič, Beyond Semiconductor In this blog post, we explore the concept of information flow tracking (IFT) from the field of computer security and its importance in enhancing data…
CROSSCON - 3rd GA Meeting (Portugal)
Guimarães, Portugal
Enhancing IoT Security through Device-to-Device Authentication
Author: Rafał Kochanowski, 3mdeb In the contemporary digital realm, the principle of multi-factor authentication (MFA) has become a cornerstone, especially in sectors like banking. Traditionally…
Cybersecurity is a Community Effort
Author: David Purón, Barbara IoT Undoubtedly, deploying Internet of Things (IoT)-connected devices, whether they are sensors, edge gateways, or large equipment, presents significant…
Enhancing Security in Agricultural UAVs: The Power of Remote Attestation
Author: Malvina Catalano, CYSEC In today's modern agricultural landscape, Unmanned Aerial Vehicles (UAVs), commonly known as agricultural drones, are revolutionizing the way farmers operate.…
RISC-V Summit Europe 2023
Barcelona, Spain