Timesys » Embedded Development
818 FOLLOWERS
Timesys is a pioneer and industry leader in open source software security, development tools and engineering services spanning the embedded software market. Follow to get updates on Embedded Development.
Timesys » Embedded Development
1y ago
Timesys
Introduction to Containers on Embedded Linux
Containerized applications have been a common solution in the server and even desktop space for quite a while. More recently they’ve also been gaining interest on embedded projects. Containers can help decouple application development from the development of the embedded platform itself in timelines, teams, and tools. They can also allow application developers to work […]
The post Introduction to Containers on Embedded Linux appeared first on Timesys from Brian Bender ..read more
Timesys » Embedded Development
1y ago
Timesys
Securing U-Boot: A Guide to Mitigating Common Attack Vectors
Learn about ways in which you can protect and secure U-Boot implementations on your embedded systems. This involves signed FIT images, environment protections, and serial console disablement methods.
The post Securing U-Boot: A Guide to Mitigating Common Attack Vectors appeared first on Timesys from Nathan Barrett-Morrison ..read more
Timesys » Embedded Development
1y ago
Timesys
Discretionary Access Control (DAC) Hardening
Discretionary Access Control hardening can further improve your embedded system’s security by limiting userspace access to proprietary intellectual property, exploitable binaries, and privileged information. The example permissions shown here are defaults produced during a demonstration Yocto build.
In Linux, a file has the following relevant parameters (when listing a file with the “ls” command):
The post Discretionary Access Control (DAC) Hardening appeared first on Timesys from Nathan Barrett-Morrison ..read more
Timesys » Embedded Development
1y ago
Timesys
5 Lessons Learned From the Log4j Vulnerability…and How the Embedded Industry Can Be Better Prepared for the Next One
Log4j has set the security world ablaze. With the first vulnerability (CVE-2021-44228) ranked with a CVSS score of 10 — as high as the scale goes — everyone is paying attention.
The post 5 Lessons Learned From the Log4j Vulnerability…and How the Embedded Industry Can Be Better Prepared for the Next One appeared first on Timesys from Leah Simoncelli ..read more
Timesys » Embedded Development
2y ago
Timesys
Securing U-Boot: A Guide to Mitigating Common Attack Vectors
Learn about ways in which you can protect and secure U-Boot implementations on your embedded systems.
The post Securing U-Boot: A Guide to Mitigating Common Attack Vectors appeared first on Timesys from Nathan Barrett-Morrison ..read more
Timesys » Embedded Development
2y ago
This article discusses the process by which your kernel’s configuration can be strengthened to protect against common security exploits. This is sometimes referred to as hardening, or specifically in this context, kernel configuration hardening.
A Linux kernel configuration is a file which defines all of the enabled (or disabled) options which are compiled in to your kernel. If you have not seen one before, they generally reside in ...
  ..read more
Timesys » Embedded Development
2y ago
Discretionary Access Control hardening can further improve your embedded system’s security by limiting userspace access to proprietary intellectual property, exploitable binaries, and privileged information. The example permissions shown here are defaults produced during a demonstration Yocto build.
In Linux, a file has the following relevant parameters (when listing a file with the “ls” command):
  ..read more
Timesys » Embedded Development
2y ago
Log4j has set the security world ablaze. With the first vulnerability (CVE-2021-44228) ranked with a CVSS score of 10 — as high as the scale goes — everyone is paying attention.
  ..read more
Timesys » Embedded Development
2y ago
Timesys’ Embedded Board Farm (EBF) lets you seamlessly access your hardware boards from anywhere as if it were right next to you. And we’ve just made it even easier and more convenient by adding our command line interface (CLI).
This provides embedded software engineers with two major benefits:
  ..read more