blog_logo

We provide three services:

  • Embedded security consultant (on retainer)
  • Hardware/IoT Penetration Testing and Review
  • Training on various embedded security topics
(more…) View services
Our Blog

Latest Updates

In this episode, I introduce the DICE (Device Identifier Composition Engine). I mentioned the motivation for the Trusted Computing Group (TCG) to make this standard and why its specifically tailored for embedded devices like MCUs and smaller controllers.

Continue Reading

In this episode I talk about the ATECC608 that’s on the SAMA7G Eval Kit and why, even though the SAMA7 includes TrustZone, you would want an external IC.

Continue Reading

Embedded Linux devices are generally lacking in security, but especially file system security. While I’m seeing the ship start to turn with respect to secure boot, there is still a wide lack of file system prevention and monitoring security.

Continue Reading
View Blog