Improving Embedded Operating System Security Part 5: Securing Code and Data
By Bill Graham Secure the Boot and Execution Embedded systems are vulnerable at boot time. For example, it’s common for hobbyists to re-flash consumer products’ firmware to change the way it operates....
11 years ago
•
1 min read