real-time operating system
12 articles
real-time operating system
Improving Embedded Operating System Security Part 4: Partition Systems to Protect Essential Components
By Bill Graham An effective security technique is to separate different major components of a system into partitions. In some cases these partitions are physical, i.e., separate devices with physical...
embedded security
Improving Embedded Operating System Security Part 3: Secure Your Network Communication
By Bill Graham Many security issues with embedded systems stem from their connection via a network with access open to a large population (enterprise network) or even directly to the Internet. Also,...
embedded security
Improving Embedded Operating System Security Part 2: Enable a More Secure Configuration
By Bill Graham Despite the hype surrounding the state of embedded security, many of the runtime platforms that these systems are based on can be made more secure through proper configuration. Moreover...