operating system

2 articles

Operating System Hardening Techniques and Security Strategies

By AJ Shipley In my last blog post, I focused on securing the device at a high level, and in this post, I’d like to dive a bit deeper into the technical aspects of device security; specifically, regarding defense against “run time,” or operational vulnerabilities, that a system is exposed to after it has booted up.  A defense in depth…

Improving Embedded Operating System Security Part 6: Harden the System Against Attack

By Bill Graham In the previous posts I’ve discussed various steps that need to be taken in order to improve security, but these are all preventative measures that require validation before a device is ready for market. Enabling the security features of your embedded OS is the first step, but it’s important to test the system continuously throughout development. The…