Introduction to Security Design in Embedded Linux Systems

Introduction to Security Design in Embedded Linux Systems

Follow + star our public account, don’t miss the wonderful content Author: HywelStar Recently, while chatting with several friends involved in embedded systems, we discussed system security and found that many projects are still relatively weak in system-level security design. Today, let’s talk about what security hardening can be done at the system level in … Read more

Trojan Detection Using Hardware Virtualization: Discussing a 60-Core Crystal Protection Engine

Trojan Detection Using Hardware Virtualization: Discussing a 60-Core Crystal Protection Engine

Although the 60 software has many advertisements, it is possible to turn off the ads in its settings with a little effort. I particularly appreciate the 60’s Crystal Protection Engine, which utilizes hardware virtualization and is said to have posed challenges for script kiddies. First, let’s talk about the location: 1. 60 Security Guard 2. … Read more