
Bao - Virtual Worshop
Online

Ensuring the Integrity of IoT Devices: Best Practices for Secure Firmware Updates
Author: Ákos Milánkovich, Security Analyst at SEARCH-LAB The Internet of Things (IoT) has become an integral part of our daily lives, offering unprecedented convenience and efficiency.…

FPGA-based Trusted Execution Environments and Their Use Cases
Authors: Shaza Zeitouni, Postdoctoral Researcher at TU DarmstadtHuimin Li, PhD Student at TU Delft Field Programmable Gate Arrays (FPGAs) represent a category of integrated circuits (ICs)…

SYNERGIES: Cyber Security and Data Protection Cluster
Caparica, Portugal

Information Flow Tracking: Enhancing Data Security and Privacy
Author: Jurij Mihelič, Beyond Semiconductor In this blog post, we explore the concept of information flow tracking (IFT) from the field of computer security and its importance in enhancing data…

CROSSCON - 3rd GA Meeting (Portugal)
Guimarães, Portugal

Enhancing IoT Security through Device-to-Device Authentication
Author: Rafał Kochanowski, 3mdeb In the contemporary digital realm, the principle of multi-factor authentication (MFA) has become a cornerstone, especially in sectors like banking. Traditionally…

Cybersecurity is a Community Effort
Author: David Purón, Barbara IoT Undoubtedly, deploying Internet of Things (IoT)-connected devices, whether they are sensors, edge gateways, or large equipment, presents significant…