Analysis of Rails 8 Authentication Implementation (1) – Theoretical Preparation

Analysis of Rails 8 Authentication Implementation (1) - Theoretical Preparation

Ten days ago, 37signals published an article: A vanilla Rails stack is plenty, this article reinforced my long-standing belief: If Rails provides a solution, it’s best to stick with Rails’ solution. Maintaining minimal dependencies and reducing upgrade barriers is certainly important; more importantly, it is to learn the “optimal solution” after top developers think and … Read more

StellarG6 SR6 G7 Series: Comprehensive Analysis of High-Performance Automotive MCU

StellarG6 SR6 G7 Series: Comprehensive Analysis of High-Performance Automotive MCU

Click the blue text to follow us The StellarG6 SR6 G7 series is a 32-bit Arm® Cortex®-R52+ automotive-grade integrated MCU designed to meet the needs of high-performance domain controllers and ECUs. It excels in interconnected, updatable automation and electric vehicle architectures, offering top-notch real-time performance and safety capabilities (supporting up to ASIL-D standards). By introducing … Read more

How to Build Future IoT Applications

How to Build Future IoT Applications

Click the “blue text” above, select “Set as Favorite“ Key information delivered on D1 time! Mobile applications will become the connection point for many IoT devices, and it is necessary to explore how to build future IoT applications. In the next decade, the number of IoT devices worldwide will grow from 75 billion in 2020 … Read more

Introduction to IoT Firmware Vulnerability Research

Introduction to IoT Firmware Vulnerability Research

With the advent of the 5G era, the role of the Internet of Things (IoT) is becoming increasingly important, along with more security risks. IoT security covers a wide range of topics. This series of articles will discuss the author’s understanding of IoT vulnerability research from a technical perspective. The author will explore five dimensions: … Read more

Exploring The Three Pillars Of Cortex-M Security

Exploring The Three Pillars Of Cortex-M Security

Hello everyone, I am Pi Zi Heng, a genuine tech enthusiast. Today, I will introduce the ARM Cortex-M functional modules, focusing on three processors with security features. The ARM Cortex-M processor family has evolved over 8 generations by 2020. In addition to the previously discussed CM0/CM0+, CM1, CM3, CM4, and CM7 in the article “Differences … Read more

Insights on Small FPGA Development

Insights on Small FPGA Development

Lattice recently cited data from IHS at its new product launch event, indicating that the market growth rate for FPGA chips will outpace the overall semiconductor market over the next 4-6 years. While different research institutions provide varying estimates for the FPGA market size, this is indeed a consensus. Typically, these reports mention potential drivers … Read more

The Role of Watchdogs in Embedded Systems

The Role of Watchdogs in Embedded Systems

Click the blue text above Tan Si Laboratory to get more information on automotive cybersecurity 01 What is a Watchdog? The watchdog technology was first proposed by AMD, a U.S. semiconductor giant, in the 1980s. It is a technology specifically designed to detect and record the operational status of processors and reset them in case … Read more

Automotive Security Testing Checklist

Automotive Security Testing Checklist

Is it really possible for hackers to remotely control all cars’ autonomous driving systems and connected vehicle terminals as depicted in “Fast and Furious”? With the commercialization of 5G technology and the continuous advancement of intelligent and connected vehicles, the emergence of high-risk vulnerabilities in systems like Jeep Uconnect and BMW ConnectedDrive poses a threat … Read more