Analysis of Risks and Security Assurance in Real-Time Embedded Systems

Analysis of Risks and Security Assurance in Real-Time Embedded Systems

Since the second issue of 2020, the “Foreword” column has been launched in the journal “Microcontrollers and Embedded System Applications”, inviting an industry expert each issue to share their views on embedded technology related to current hot topics, benefiting embedded technology practitioners and enthusiasts. The article published today is the foreword for the 12th issue … Read more

Essential Encryption Algorithms for System Security

Essential Encryption Algorithms for System Security

With the advent of the era of artificial intelligence and the Internet of Things, data applications have become frequent. How should data security be protected? What software encryption algorithms are there, and in what areas are these algorithms applied? As you read on, you will discover the “small passwords” surrounding us. Symmetric Encryption Algorithms Symmetric … Read more

Discussion on Three Issues in Functional Safety of Embedded Systems

Discussion on Three Issues in Functional Safety of Embedded Systems

Discussion on Three Issues in Functional Safety of Embedded Systems Three Issues in Functional Safety of Embedded System Functional safety is the basic requirement of modern industrial products. This paper discusses three related topics: The first is that the functional safety demand of automobile is probably higher than that of airplane. This point may affect … Read more

How to Implement Functional Safety in Embedded Systems

How to Implement Functional Safety in Embedded Systems

|Note: The following content is extracted from the China Technical Elite Annual Conference for learning reference only! The content involves: C19L06 FS1, with the standard being: ISO 26262-2011 version F/S Design Process and V-Model Implementation Traceability Matrix Requirements Hardware/Software Interaction Architecture Design Programming Languages and Coding, Coding Guidelines

Security Issues Faced by Embedded Systems and Solutions

Security Issues Faced by Embedded Systems and Solutions

In the context of the Internet of Everything, the Internet of Things (IoT) is rapidly developing, and the scale of IoT smart devices and data far exceeds the defensive capabilities of traditional internet security architectures. The security issues of IoT smart devices and cloud services pose significant challenges to the construction and popularization of IoT. … Read more

Embedded Security: Establishing Trusted Computing Systems Based on Intel Hardware

Embedded Security: Establishing Trusted Computing Systems Based on Intel Hardware

In recent years, malicious code has caused significant damage to computer systems worldwide. For example, the “WannaCry” ransomware worm, released in May 2017, severely damaged thousands of computers by encrypting data. In just one day, the “WannaCry” virus infected 150 countries and 230,000 systems. According to statistics from the FBI, ransomware is the fastest-growing malware … Read more

Building and Debugging the JTAGulator for Embedded Security

Building and Debugging the JTAGulator for Embedded Security

1Introduction Online debugging (OCD, On-Chip Debugging) interfaces provide chip-level control over target devices, serving as a primary means for engineers, researchers, and hackers to extract firmware code or data, modify memory contents, or change device operations. If you are familiar with hardware circuits or embedded systems, you certainly know that JTAG (Joint Test Action Group) … Read more

Explaining Embedded Security in Simple Terms

Explaining Embedded Security in Simple Terms

In a world filled with PPT presentations, some phenomena are quite interesting. For example, maybe your girlfriend has never heard of what an embedded system is, but she definitely knows what the Internet of Things (IoT) is; even if she doesn’t know that “the Internet has no privacy,” she surely knows that “the most critical … Read more

Security Technology Analysis of Embedded Systems (Part 1)

Security Technology Analysis of Embedded Systems (Part 1)

Researchers from Kaspersky Lab periodically analyze the popular security technologies in the cybersecurity market. This time, they decided to study what security technologies operating system developers provide for embedded systems (in other words, the Internet of Things). Our main interest lies in how these operating systems address issues related to cybersecurity. Note that during the … Read more