Salesmen and Marketeers are fond of the Sales Funnel. Basically, it represents a sales process wherein a prospect starts at the top of the funnel with many options to chose … Continue reading The Engineering Funnel
smxAware was enhanced with new features to help debug issues related to the Memory Protection Unit in SecureSMX systems. These are covered here. The IAR debugger displays the MPU registers … Continue reading MPU Debugging with smxAware
Factory threats are escalating at a staggering rate. Honeywell has written a helpful report (Ref. 1) on how USB devices are being used to circumvent the air gap that protects … Continue reading Blocking USB Threats
For Secure IoT Devices Most embedded systems that are connected to the Internet, also known as things or devices, are based upon microcontrollers having moderate performance and small to moderate … Continue reading To Partition Or Not To Partition
Is it time to herd your CWEs (Common Weakness Enumerations) into a safe coral where they won’t trample your code? In a recent report, 918 CWEs have been identified and … Continue reading Get Along Little Dogies
pmode partitions may be just as effective as umode partitions for reliability; however, umode partitions are much better for security for the following reasons: The hardware enforced pmode barrier prevents … Continue reading Moving Uptown to Umode
It is now possible to greatly increase the security of FreeRTOS projects by porting them to SecureSMX®, using FRPort™. SecureSMX facilitates partitioning an application into isolated partitions. This provides strong … Continue reading FreeRTOS Security? Not To Worry
SOUP (Software of Unknown Pedigree) is often incorporated into embedded system projects due to schedule pressure, lack of in-house expertise, or for other reasons, and it ends up in the … Continue reading What’s In Your SOUP?
Many Things are embedded systems to which networking has recently been added. As such, hackers coming in via the Hacker’s Highway (aka the Internet) can overcome the weak defenses of … Continue reading Where’s The Gold?
Introduction The figure below shows the security structure of typical microcontroller embedded software. There is no structure! A hacker who has gained access to the system, has access to anything … Continue reading Is Your Thing In Danger?