bao-workshop

Bao - Virtual Worshop

Online
bp8

Ensuring the Integrity of IoT Devices: Best Practices for Secure Firmware Updates

Author: Ákos Milánkovich, Security Analyst at SEARCH-LAB The Internet of Things (IoT) has become an integral part of our daily lives, offering unprecedented convenience and efficiency.…
bp7

FPGA-based Trusted Execution Environments and Their Use Cases

Authors: Shaza Zeitouni, Postdoctoral Researcher at TU DarmstadtHuimin Li, PhD Student at TU Delft Field Programmable Gate Arrays (FPGAs) represent a category of integrated circuits (ICs)…
bp6-2

Information Flow Tracking: Enhancing Data Security and Privacy

Author: Jurij Mihelič, Beyond Semiconductor In this blog post, we explore the concept of information flow tracking (IFT) from the field of computer security and its importance in enhancing data…
ga-gmr

CROSSCON - 3rd GA Meeting (Portugal)

Guimarães, Portugal
bp-5

Enhancing IoT Security through Device-to-Device Authentication

Author: Rafał Kochanowski, 3mdeb In the contemporary digital realm, the principle of multi-factor authentication (MFA) has become a cornerstone, especially in sectors like banking. Traditionally…
BLOG-POST-4

Cybersecurity is a Community Effort

Author: David Purón, Barbara IoT  Undoubtedly, deploying Internet of Things (IoT)-connected devices, whether they are sensors, edge gateways, or large equipment, presents significant…