Research on Security Vulnerability Detection of External SDKs in Android Systems

Research on Security Vulnerability Detection of External SDKs in Android Systems

SDK(Software Development Kit, SDK) is a set of tools for Android application developers, including basic information about hardware platforms, software protocol frameworks, operating systems, etc. Its purpose is to improve the development efficiency of Android applications. Most Android apps developed by many software vendors are generally based on existing SDKs, and products are developed based … Read more

Essential Security Technologies in Arm Learning

Essential Security Technologies in Arm Learning

This article comes from the Jishu Community special topic, mainly sharing learning materials related to security technology. This Issue’s Special Recommendations This issue recommends a special topic on security technology, covering learning about the ShanHai security processor from Arm, learning about Arm TrustZone technology (including interrupts), Arm PSA technical materials, privacy computing, information and functional … Read more

Differences and Similarities Between IoT and Edge Computing

Differences and Similarities Between IoT and Edge Computing

Introduction: As more and more IoT devices connect, they generate massive amounts of data. However, sending all this data to the cloud for processing may be counterproductive. Edge computing pushes data processing closer to the source (sensor devices) instead of sending it to a centralized cloud located thousands of miles away. In recent years, low-cost … Read more

Designing an IoT Gateway from Scratch

Designing an IoT Gateway from Scratch

Follow the Embedded Learning Station, bringing you more fresh hot topics every day. 🤟 Tips: This article has a total of 622 words, expected reading time is 4 minutes~ ▇ What is an Industrial IoT Gateway? An industrial IoT gateway is a hardware device or software program that connects local devices in industrial scenarios (such … Read more

MCUs Address Industrial Automation and IIoT Challenges

MCUs Address Industrial Automation and IIoT Challenges

The performance requirements of designers in industrial automation and the Industrial Internet of Things (IIoT) are constantly changing. In terms of microcontrollers (MCUs), they seek faster processing speeds, more memory, better connectivity, and increased security features. At the same time, MCU manufacturers are brewing a new type of MCU to provide designers with a balance … Read more

The Evolution of Automotive LIN Bus Technology

The Evolution of Automotive LIN Bus Technology

Yesterday, I shared an article titled “The Evolution of Automotive CAN Bus,” which sparked a lot of interest among friends, prompting them to leave messages asking for related knowledge about the LIN bus used in automobiles. Thus, I am sharing this article titled “The Evolution of Automotive LIN Bus” with everyone. I have modified the … Read more

Automated Testing System for BootLoader Programming Based on Python

Automated Testing System for BootLoader Programming Based on Python

It takes ten years to grow trees, and a hundred years to cultivate people; it takes ten years to write software, and a hundred years to refine BT! The BootLoader programming function is the most core foundational feature of the vehicle ECU, it is the “program of programs”, the mother of software, and the premise … Read more

SiFive Shield: An Open and Scalable Security Platform Architecture

SiFive Shield: An Open and Scalable Security Platform Architecture

SiFive Shield is an open and scalable platform architecture designed to provide a comprehensive SoC security approach for RISC-V based designs. The demands of modern SoC design dictate the need for scalable solutions for security, which provide a clear root-of-trust in the components of a trusted computing base, crucially, it is auditable. Customizable features are … Read more

Implementing CAN Bus Communication Protocol in Embedded C

Implementing CAN Bus Communication Protocol in Embedded C

For training, consulting, or project development, please contact 【Thought】 Readers of this public account must be familiar with the CAN communication protocol. Have you ever wondered how these signals are implemented in the communication protocol within the Electronic Control Unit (ECU) when collecting CAN bus signals and analyzing data? This content introduces how to implement … Read more

Dynamic Fault Injection Practice on White-box Cryptography Using Unicorn

Dynamic Fault Injection Practice on White-box Cryptography Using Unicorn

Kerckhoffs principle states that the security of a cryptographic system relies solely on the security of the key, with everything else in the system considered public information. However, in reality, software reverse engineering and dynamic/static debugging techniques have successfully executed key extraction attacks on cryptographic systems. Given this fact, both the industry and academia have … Read more