blog_logo

We provide three services:

  • Embedded security consultant
  • Hardware/IoT Penetration Testing and Review
  • Training on various embedded security topics

Schedule a call with me to discuss your security questions!

(more…) View services
Our Blog

Latest Updates

How to securely handle time on embedded systems? Do you trust your time or not? What should you do if the certificate expires? Where do you sync your time from?

Continue Reading

In this episode, I introduce the DICE (Device Identifier Composition Engine). I mentioned the motivation for the Trusted Computing Group (TCG) to make this standard and why its specifically tailored for embedded devices like MCUs and smaller controllers.

Continue Reading

In this episode I talk about the ATECC608 that’s on the SAMA7G Eval Kit and why, even though the SAMA7 includes TrustZone, you would want an external IC.

Continue Reading
View Blog