Hardware Tools with IoT Security Applicability

Over the past few years, cybersecurity has entered the public consciousness thanks to attacks that had direct effects on consumers privacy. Attacking traditional Information Technology (IT) systems such as desktop computers and servers can almost be a trivial matter for attackers with even moderate skills. Thanks to the plethora of software tools available and the…

Read More

Primer on Embedded Side Channel Attacks

“Attack him where he is unprepared, appear where you are not expected.” Sun-Tzu, Art of War For much of the history of embedded systems, many product designers and engineers have had the luxury of building rather closed loop systems with little to no interaction with other systems. A so-called “security through obscurity” was perhaps not…

Read More