security_first
's profile
Biography has not been added
security_first
's contributions-
-
- 04.30.2012
- Book worms
Father and son team write the book on embedded systems security. Plus a flaw a day for Android.
-
Embedded systems designers can protect sensitive data that's on a device's hard drive (data-at-rest) by using encryption techniques.
-
- 01.20.2012
- Muscle cars
Software-borne features and system virtualization have become key differentiators for automotive OEMs.
-
- 01.03.2012
- The hackers have your PlayBook
How vulnerable will the new RIM microkernel be to hackers?
-
- 11.18.2011
- Monolithic stupidity
Microkernel vs. monolithic? Duqu, a Stuxnet-like worm, proves the monolithic operating system is dangerous.
-
- 08.02.2011
- Take your medicine, eat your SOUP
The FDA should scrap its panel for approving medical device and learn some lessons from the FAA.
-
- 07.25.2011
- Forking your friends
Understand your insider threats and come up with a plan to reduce that risk instead of ignoring this crucial aspect of embedded security.
-
- 05.26.2011
- Scrambled eggs
Easter eggs may be harmless but what if a developer inserts a malicious rotten egg into your code? Developers require assured bit provenance.
-
- 04.24.2011
- The future of personal computing
As personal and work life start to mix more on handheld devices, how do you keep both separate and secure?
-
- 03.15.2011
- Skim milk
How do you make smartphones into trustworthy platforms?
-
-
-
- 12.15.2008
- We're really vulnerable
The certified operating system enables protection against many forms of social engineering, but to be clear, the solutions typically involve more than just the secure operating system. For example, we have devised a solution to the insecurity of web transactions caused by social engineering attacks in which users click on malicious web sites (linking to fraudulent servers, causing malware to be downloaded, etc.). This solution involves the INTEGRITY kernel and a small number of secure components that run natively on INTEGRITY, while using virtualization to provide the user's expected user environment (e.g. Windows or Linux). I'm happy to discuss in more detail with folks who are interested in certified high robustness solutions to their enterprise security concerns. I can be contacted at davek@ghs.com or davek@integrityglobalsecurity.com. Hope this helps!
-
-

