Avatar photo
By: Radoslav Kolev

January 18, 2024 10:39 am

2,081 views

How to extract the signer’s certificate and verify the signature of a Linux kernel image

It's been quite a while since the introduction of UEFI and Secure Boot, which ensures that only code bearing a signature by a trusted party will get executed by the firmware. After a brief period of uncertainty this is now well supported by default in many Linux distributions. The Zero trust security model gaining popularity […]

Read More


Avatar photo
By: rohamilton

August 8, 2019 6:27 pm

4,746 views

A Blunt Reminder About Security for Embedded Computing

  Recent news of the VxWorks security breach raises the unsettling question that those of us in the embedded computing industry have grappled with for decades. How do we secure an embedded operating system from a nefarious attack? The ICS Advisory (ICSA-19-211-01) released on July 30th by the Cybersecurity and Infrastructure Security Agency (CISA) […]

Read More