Principles of Heterogeneous Communication in Multi-Core MCUs

Principles of Heterogeneous Communication in Multi-Core MCUs

Click the blue text aboveTalks Lab to get more information on automotive network security With the continuous development of electronic technology and the growing market demand, embedded systems are required not only to perform complex control tasks but also to collect and process data in real-time. To meet these demands, multi-core heterogeneous processors have become … Read more

Implementation Strategies for Secure Boot in Automotive Information Security

Implementation Strategies for Secure Boot in Automotive Information Security

Introduction Are you aware of the following: What is the significance of automotive information security? What is the main purpose of Secure Boot? What are the conventional implementation solutions for Secure Boot? In this article, we will explore and answer these questions together. For better understanding, here is the outline of the article: ▍Main Content … Read more

Dissecting the Chevrolet Heavy-Duty Pickup ECU: How a ‘Hacker’ Breached the ‘Unhackable’

Dissecting the Chevrolet Heavy-Duty Pickup ECU: How a 'Hacker' Breached the 'Unhackable'

Five years ago, a new adjustable ECU/ECM claimed to be “unhackable” and dominated the market at that time; it was the GM E41 ECM Services (L5P). This ECU/ECM first appeared on the L5 Peter Max truck in 2017, and many believed that such ECUs/ECMs could not be hacked or tuned. As experts from the external … Read more

Fault Injection in Diagnostic Protocols

Fault Injection in Diagnostic Protocols

Click the blue text above to follow us / Technical Exchange Group/ Add WeChat 15021948198 to apply for membership to download PPT & join the automotive network information security, testing evaluation, automotive electronics, autonomous driving technology exchange group, recruitment job-seeking group, investment and financing cooperation group… Related Articles [Grab Your Spot] Countdown! The 8th Information … Read more

Automotive Chip Security Testing Using Electromagnetic Fault Injection

Automotive Chip Security Testing Using Electromagnetic Fault Injection

For more information and discussions, please contact “Niu Xiaoka” on WeChat: NewCarRen Abstract Electromagnetic Fault Injection (EMFI) is a well-known method for introducing faults for the security analysis of digital devices. Such faults can be viewed as similar to those known to occur naturally in digital devices, which is a recognized issue in designing safety-critical … Read more

Rust Takes Over C: Notable C Projects Rewritten in Rust

Rust Takes Over C: Notable C Projects Rewritten in Rust

Welcome to subscribe to my paid column “Zhang Handong’s Rust Channel” on Mowen Dongxi, where I take you deep into understanding everything related to the Rust language, its ecosystem, and applications in the commercial field. This article is an excerpt from it. “ The purpose of this article is not to praise Rust, but to … Read more

Using Linux Text Processing Tools for Subdomain Search

Using Linux Text Processing Tools for Subdomain Search

Application Background In practical scenarios, we often need to collect subdomains of target sites, usually using tools like subdomain excavators, oneforall, etc., or space search engines like fofa, shodan, and eagle map, or Google syntax. Besides the conventional methods, we can also utilize the Linux text processing tools we learned earlier to collect subdomains. Steps … Read more

Zephyr: A New Generation RTOS That Is Efficient and Secure

Zephyr: A New Generation RTOS That Is Efficient and Secure

What Is Zephyr? Zephyr is a new generation real-time operating system (RTOS) designed for various hardware architectures. It offers scalability, optimization, and security, making it one of the preferred choices among developers. Scalability One of Zephyr’s greatest advantages is its scalability. It can be easily applied to various hardware architectures, including ARM, x86, RISC-V, etc., … Read more

Proactive Security: Understanding LoRa Technology

Proactive Security: Understanding LoRa Technology

The Internet of Things (IoT) revolution is in full swing, with various LPWAN technologies emerging rapidly, each vying to seize market share. LoRa, as one of the earliest commercialized LPWAN technologies, has been deployed in 95 countries globally, with over 500 alliance members. In China, Alibaba has announced its comprehensive promotion of LoRa coverage and … Read more