5 Elements to Secure Embedded Systems – Part #4 Secure Bootloaders

In “5 Elements to a Secure Embedded System – Part 3 Secure Boot”, we continued our discussion about the five essential elements required to begin securing an embedded system. As you may recall, the five elements that every developer should be looking to implement are: Hardware based isolation A Root-of-Trust (RoT) A secure boot solution … Continue reading 5 Elements to Secure Embedded Systems – Part #4 Secure Bootloaders

3 Use Cases for Multicore Microcontrollers

Multicore microcontrollers are starting to become popular among embedded systems designers. Designers can leverage multiple cores by breaking their applications up into separate application (execution) domains. Each domain then has a dedicated function to fulfill in the system. While multiple cores have been used in safety-critical applications for some time, there are several additional use … Continue reading 3 Use Cases for Multicore Microcontrollers

Programming the STM32 Option Bytes using SEGGER J-Flash

Nearly every microcontroller contains option bytes, fuses, or some method to control general settings on the processor. These settings often control features such as whether debugging is enabled or disabled, flash can be written or read, and even how the processor will boot. In this post, we will explore how to program the STM32 option … Continue reading Programming the STM32 Option Bytes using SEGGER J-Flash

3 Development Boards to Get Started with TrustZone for Cortex-M Microcontrollers

Developing a product today without taking security into account is foolhardy. Nearly every device being developed today is in some way connected, which means there is an avenue for attacking the system. There are several different architectures that developers can leverage when developing a secure system. One that has emerged in recent years starting with … Continue reading 3 Development Boards to Get Started with TrustZone for Cortex-M Microcontrollers

5 Elements to Secure Embedded Systems – Part #3 Secure Boot

In “5 Elements to a Secure Embedded System – Part 2 Root-of-Trust”, we continued our discussion about the five essential elements required to begin securing an embedded system. As you may recall, the five elements that every developer should be looking to implement are: Hardware-based isolation A Root-of-Trust (RoT) A secure boot solution A secure … Continue reading 5 Elements to Secure Embedded Systems – Part #3 Secure Boot

5 Elements to Secure Embedded System – Part #2 Root-of-Trust (RoT)

In “5 Elements to Secure Embedded Systems – Part #1 Hardware-Based Isolation”, we started our discussion about the five essential elements required to begin securing an embedded system. As you may recall, the five elements that every developer should be looking to implement are: Hardware-based isolation A Root-of-Trust (RoT) A secure boot solution A secure … Continue reading 5 Elements to Secure Embedded System – Part #2 Root-of-Trust (RoT)

5 Elements to Secure Embedded Systems – Part #1 Hardware Based Isolation

Nearly every embedded system requires some level of security, whether it’s just the basics to lock down the programming port or something more complex to protect a connected device from hackers. For many developers, creating secure embedded systems can be intimidating. Many embedded developers don’t come from a security background and have to learn security … Continue reading 5 Elements to Secure Embedded Systems – Part #1 Hardware Based Isolation

Webinar – An Introduction to Secure Product Lifecycle Management (sPLM)

The Webinar Recording can be accessed at the following link: Click here to Watch Webinar On-Demand Webinar Description One of the most overlooked areas in IoT product development today is how to securely manage a devices life cycle. Focus is often placed on developing the product, connecting it to the internet and building a user … Continue reading Webinar – An Introduction to Secure Product Lifecycle Management (sPLM)

The 3 Stages in Secure Product Lifecycle Management

Nearly every embedded software developer working in the IoT space is now building secure devices. Developers have been mostly focused on how to handle secure applications and the basic microcontroller technologies such as how to use Arms TrustZone or leverage multicore processors. A looming problem that many companies and teams are overlooking is that figuring … Continue reading The 3 Stages in Secure Product Lifecycle Management