Fault Injection in Diagnostic Protocols

Fault Injection in Diagnostic Protocols

Click the blue text above to follow us / Technical Exchange Group/ Add WeChat 15021948198 to apply for membership to download PPT & join the automotive network information security, testing evaluation, automotive electronics, autonomous driving technology exchange group, recruitment job-seeking group, investment and financing cooperation group… Related Articles [Grab Your Spot] Countdown! The 8th Information … Read more

Automotive Chip Security Testing Using Electromagnetic Fault Injection

Automotive Chip Security Testing Using Electromagnetic Fault Injection

For more information and discussions, please contact “Niu Xiaoka” on WeChat: NewCarRen Abstract Electromagnetic Fault Injection (EMFI) is a well-known method for introducing faults for the security analysis of digital devices. Such faults can be viewed as similar to those known to occur naturally in digital devices, which is a recognized issue in designing safety-critical … Read more

Rust Takes Over C: Notable C Projects Rewritten in Rust

Rust Takes Over C: Notable C Projects Rewritten in Rust

Welcome to subscribe to my paid column “Zhang Handong’s Rust Channel” on Mowen Dongxi, where I take you deep into understanding everything related to the Rust language, its ecosystem, and applications in the commercial field. This article is an excerpt from it. “ The purpose of this article is not to praise Rust, but to … Read more

Using Linux Text Processing Tools for Subdomain Search

Using Linux Text Processing Tools for Subdomain Search

Application Background In practical scenarios, we often need to collect subdomains of target sites, usually using tools like subdomain excavators, oneforall, etc., or space search engines like fofa, shodan, and eagle map, or Google syntax. Besides the conventional methods, we can also utilize the Linux text processing tools we learned earlier to collect subdomains. Steps … Read more

Zephyr: A New Generation RTOS That Is Efficient and Secure

Zephyr: A New Generation RTOS That Is Efficient and Secure

What Is Zephyr? Zephyr is a new generation real-time operating system (RTOS) designed for various hardware architectures. It offers scalability, optimization, and security, making it one of the preferred choices among developers. Scalability One of Zephyr’s greatest advantages is its scalability. It can be easily applied to various hardware architectures, including ARM, x86, RISC-V, etc., … Read more

Proactive Security: Understanding LoRa Technology

Proactive Security: Understanding LoRa Technology

The Internet of Things (IoT) revolution is in full swing, with various LPWAN technologies emerging rapidly, each vying to seize market share. LoRa, as one of the earliest commercialized LPWAN technologies, has been deployed in 95 countries globally, with over 500 alliance members. In China, Alibaba has announced its comprehensive promotion of LoRa coverage and … Read more

Enterprise-Level WiFi: Understanding LoRa Technology

Enterprise-Level WiFi: Understanding LoRa Technology

▲ Click the above Leifeng Network to follow Proactive security, extensive enterprise deployment, LoRa’s five major advantages make it a globally applicable IoT technology. This article is reprinted from | Network Optimization Mercenary The IoT revolution is in full swing, with various LPWAN technologies emerging rapidly, all eager to seize a foothold. LoRa, as one … Read more

Wi-Fi Vulnerability: How to Connect More Securely

Wi-Fi Vulnerability: How to Connect More Securely

First, let’s look at two news headlines: Major Security Vulnerability Found in Wi-Fi! Affects All Wireless Devices At This Moment! Global Wi-Fi is Not Safe Scared? Has the 13-year-old WPA2 been cracked? Recently, researcher Mathy Vanhoef from KU Leuven University in Belgium publicly released a study on the security of WPA2/WPA, claiming that the protocol … Read more

How to Protect Your Home Wi-Fi from Theft

How to Protect Your Home Wi-Fi from Theft

Nowadays, Wi-Fi has become a necessity in our lives.However, you have probably seen many news stories like this:Hackers stealing personal information through home Wi-Fi, causing privacy breaches and even financial losses.You might wonder, is it really that easy for this to happen, or is there a way to prevent your own Wi-Fi from being stolen? … Read more

Understanding UDS Diagnostics: Essence and Detailed Explanation

Understanding UDS Diagnostics: Essence and Detailed Explanation

Looking Beyond the Phenomenon to the Essence Functional Signal Signal communication is a basic function of the vehicle ECU; without it, nothing can be discussed! This can be plainly stated as dbc and HIL, which are the starting points of ECU’s basic capabilities~ Bus 10[2] discusses the release of excel2dbc tool 2.0.2, adding signal groups … Read more