Application of Embedded Linux in Industrial IoT Gateway Development

Application of Embedded Linux in Industrial IoT Gateway Development

>Total 734 words, reading time approximately 2 minutes< Embedded Linux refers to a version of standard Linux that has been miniaturized and tailored to fit into memory chips or microcontrollers with only a few kilobytes or megabytes of capacity, suitable for specific embedded applications with a specialized Linux operating system. Smart Manufacturing The success of … Read more

The Most Important Foundation of Industrial IoT – Industrial Gateway Applications and Directions

The Most Important Foundation of Industrial IoT - Industrial Gateway Applications and Directions

Content Overview How to embrace Industrial IoT? First, devices need to be connected to the network, and the data and application integration based on “connection” will drive the transformation of business models, truly realizing the value of Industrial IoT. Although it is said that sensors are the most fundamental perception devices in IoT, when people … Read more

Fault Injection in Diagnostic Protocols

Fault Injection in Diagnostic Protocols

Click the blue text above to follow us / Technical Exchange Group/ Add WeChat 15021948198 to apply for membership to download PPT & join the automotive network information security, testing evaluation, automotive electronics, autonomous driving technology exchange group, recruitment job-seeking group, investment and financing cooperation group… Related Articles [Grab Your Spot] Countdown! The 8th Information … Read more

ChaosBlade: A Tool for Large-Scale Kubernetes Fault Injection

ChaosBlade: A Tool for Large-Scale Kubernetes Fault Injection

Author | Ye Fei Source | Alibaba Middleware Team 1 ChaosBlade With the development of cloud-native technologies, the consistency, reliability, and flexible orchestration capabilities of cloud-native applications have led most enterprises to choose to migrate their applications to the cloud. However, the cloud infrastructure faces significant challenges in terms of stability and observability. ChaosBlade is … Read more

Summary of Side-Channel and Fault Injection Attacks

Summary of Side-Channel and Fault Injection Attacks

This article is contributed by the ChaMd5 Security Team IOT Group. This is a summary of the theoretical knowledge learned recently about side-channel attacks and fault injection. If there are any mistakes or areas for improvement, I hope experts will correct me. First, let’s introduce several common encryption algorithms. Encryption Algorithms RSA Encryption Algorithm RSA … Read more

Fault Injection Attack on FLASH Erasure Process

Fault Injection Attack on FLASH Erasure Process

Comprehensive Analysis of Chip Debug Interface Protection Mechanisms Author | Liu Zheng Editor | Liu Mengdi 1. Background Introduction Microcontrollers are the backbone of the modern interconnected world, with widespread applications in robotics, medical devices, aerospace, and automotive industries. With the development of the Internet of Things (IoT), microcontrollers have become even more prevalent in … Read more

Reliability Testing Based on Fault Injection Technology

Reliability Testing Based on Fault Injection Technology

Abstract: This article proposes a testing technology path aimed at design mechanisms for comprehensive verification of faults. By adopting the concept of comprehensive verification, we distill an integrated verification principle and implementation requirements based on fault injection methods. The article also presents implementation principles, processes, verification evaluation methods, and key technological connotations for application trade-offs, … Read more

Chapter 4: Fault Injection Attack Techniques

Chapter 4: Fault Injection Attack Techniques

Click the blue text Follow Us Introduction Current hardware security research has gone beyond the scope of “standalone cryptographic chips.” We need to examine hardware security from the perspective of open systems. Traditional hardware security mainly protects keys, while new security must protect not only keys but also software. OSR has launched the “Fundamentals of … Read more

Drone Security and Fault Injection Attacks

Drone Security and Fault Injection Attacks

Admin’s Note: It’s been a while since I posted a new article and logged into the public account. Unfortunately, many issues beyond my control, combined with my principle of not being a mere transporter, mean that creation always takes time. Today, I am back with an interesting topic for everyone. Drone Security and Fault Injection … Read more

Co-Design Verification Method for Automotive SoC Chips

Co-Design Verification Method for Automotive SoC Chips

For more information and inquiries, please contact “Niu Xiaoka” on WeChat: NewCarRen Abstract In the modern automotive and consumer electronics industries, the number and complexity of functions are continuously increasing. Additionally, there is pressure to shorten production time to market and achieve successful product designs on the first attempt, posing significant challenges for all chip … Read more