NIST announced in February the winner of the lightweight cipher competition. In this video I motivate WHY we even need lightweight ciphers in the first place using my favorite watch!
How to handle time on embedded systems?
How to securely handle time on embedded systems? Do you trust your time or not? What should you do if the certificate expires? Where do you sync your time from? Read More
What is the Device Identifier Composition Engine (DICE)?
In this episode, I introduce the DICE (Device Identifier Composition Engine). I mentioned the motivation for the Trusted Computing Group (TCG) to make this standard and why its specifically tailored for embedded devices like MCUs and smaller controllers. Read More
Microchip SAMA7G54 EVK and ATECC608 & Spearf1sh and the SAMA7G54 EVK
In this episode I talk about the ATECC608 that’s on the SAMA7G Eval Kit and why, even though the SAMA7 includes TrustZone, you would want an external IC. Read More
fs-verity: Embedded Linux File Protection
Embedded Linux devices are generally lacking in security, but especially file system security. While I’m seeing the ship start to turn with respect to secure boot, there is still a wide lack of file system prevention and monitoring security. Read More
Announcing the Cryptotronix Podcast
Announcing the Cryptotronix Podcast! Read More
The UK Product Security and Telecommunications Infrastructure (PSTI) Bill
The UK is proposing some interesting device cybersecurity legislation that will impact more people than they realize. Read More
Mistakes in Custom Embedded Protocols
Having audited a few custom protocols, as nearly every embedded project decides to implement them, nearly every one has had a security issue. In this video I discuss the top three issues I’ve seen. Read More
Infosec’s Midlife Crisis
Using the latest issue of IEEE Security & Privacy as a front to discuss this topic, I talked about the different focus areas of information security. Read More
Cybersecurity gets no respect!
The article, “Design for Cybersecurity from the Start” in MIT Sloan Management Review, really nails the continued issue with security for product design. Read More