Exploring Security in Connected Vehicles: Hardware Protection in Embedded Systems

Exploring Security in Connected Vehicles: Hardware Protection in Embedded Systems

Author Introduction Mr. Li Feng is a senior security consultant at Gemalto (a global leader in digital security). Having joined Gemalto, based in France, for nearly 20 years, he has been engaged in security services and solutions, focusing on IoT and automotive security for about 5 years, responsible for product security design and consulting. Exploring … Read more

In-Vehicle MCU Hardware Encryption Module Training

In-Vehicle MCU Hardware Encryption Module Training

Automotive Cybersecurity Software Development Practical Training Time: August 26-27, 2023 Location: Shanghai At the end of the document, there are related articles on automotive information security for study reference! Course Overview (Delivery cases of automotive information security-related courses include: China Automotive Innovation Center, Geely Automobile, Freytech, China Automotive Center, BAIC New Energy, ZF, Huichuang Automotive, … Read more

Embedded Weekly Report #275: Security-Critical C Code Rules

Embedded Weekly Report #275: Security-Critical C Code Rules

Note: 1. Thank you all for your attention, continuing to summarize last week’s wonderful content. 2. Last week, a video was shared: BSP Video Tutorial Episode 21: Easily Achieve Variable Length Serial Port DMA Send/Receive with One Click, Supporting Bare Metal and RTOS, Including Two Approaches: MDK and IAR, More Convenient Than CubeMX 0 Weekly … Read more

Galaxy Kirin Embedded Multi-Domain Security Control Technology Enables Feiteng E2000 Heterogeneous Embedded SoC

Galaxy Kirin Embedded Multi-Domain Security Control Technology Enables Feiteng E2000 Heterogeneous Embedded SoC

As a model of domestic operating systems, Kirin Software aligns with the development trend of intelligent manufacturing, focusing on the product development positioning of “secure and trustworthy”, “multi-system integration”, and “new human-computer interaction”. It has built a “strong real-time, rich ecological integration” Galaxy Kirin embedded operating system, recently completing the adaptation for the Feiteng embedded … Read more

Tock: Real-Time, Secure, Low-Power Embedded OS

Tock: Real-Time, Secure, Low-Power Embedded OS

Introduction Embedded operating systems play a crucial role in today’s technology field, especially in microcontroller applications. Tock is an emerging embedded operating system specifically designed for microcontrollers, gaining attention for its security and reliability. This article will provide a detailed introduction to Tock, exploring its various features and application areas. Background of Tock Tock is … Read more

Analysis of Risks and Security Assurance in Real-Time Embedded Systems

Analysis of Risks and Security Assurance in Real-Time Embedded Systems

Since the second issue of 2020, the “Foreword” column has been launched in the journal “Microcontrollers and Embedded System Applications”, inviting an industry expert each issue to share their views on embedded technology related to current hot topics, benefiting embedded technology practitioners and enthusiasts. The article published today is the foreword for the 12th issue … Read more

Discussion on Three Issues in Functional Safety of Embedded Systems

Discussion on Three Issues in Functional Safety of Embedded Systems

Discussion on Three Issues in Functional Safety of Embedded Systems Three Issues in Functional Safety of Embedded System Functional safety is the basic requirement of modern industrial products. This paper discusses three related topics: The first is that the functional safety demand of automobile is probably higher than that of airplane. This point may affect … Read more

How to Implement Functional Safety in Embedded Systems

How to Implement Functional Safety in Embedded Systems

|Note: The following content is extracted from the China Technical Elite Annual Conference for learning reference only! The content involves: C19L06 FS1, with the standard being: ISO 26262-2011 version F/S Design Process and V-Model Implementation Traceability Matrix Requirements Hardware/Software Interaction Architecture Design Programming Languages and Coding, Coding Guidelines

Security Issues Faced by Embedded Systems and Solutions

Security Issues Faced by Embedded Systems and Solutions

In the context of the Internet of Everything, the Internet of Things (IoT) is rapidly developing, and the scale of IoT smart devices and data far exceeds the defensive capabilities of traditional internet security architectures. The security issues of IoT smart devices and cloud services pose significant challenges to the construction and popularization of IoT. … Read more

Building and Debugging the JTAGulator for Embedded Security

Building and Debugging the JTAGulator for Embedded Security

1Introduction Online debugging (OCD, On-Chip Debugging) interfaces provide chip-level control over target devices, serving as a primary means for engineers, researchers, and hackers to extract firmware code or data, modify memory contents, or change device operations. If you are familiar with hardware circuits or embedded systems, you certainly know that JTAG (Joint Test Action Group) … Read more