Why IoT Security Will Cost You More

2018-10-09T12:16:34+00:00

IoT security is an increasingly urgent issue, but is still in the early stages of resolution. We take a look at the “Cost to Care” ratio, and why it is set to dictate our responses to this trend for some time to come...   The Internet of Things has been a discussion point for years, but only recently has the security aspect become anything more than a concept. However, with recent record-breaking DDoS attacks being squarely blamed on insecure IoT devices, and the publication of the botnet source code (dubbed Mirai); it’s certain this is just a beginning. With an estimated 25 to 50 billion devices set to be connected through IoT by 2020, the scale of the problem is likely to increase. But as the technology to secure, [...]

Why IoT Security Will Cost You More2018-10-09T12:16:34+00:00

Secure Boot on the iMX6 – Part 2

2018-10-09T10:35:09+00:00

With embedded systems security such a hot topic right now, we’re looking at the secure boot on the iMX6, one of electronics’ most popular processors. Part one was really an introduction to the secure boot process, examining it in detail. Here, in the second instalment of our 3-part series, we cover managing the hardware, the pitfalls of the secure boot process, and authentication.   Secure Boot – Leveraging the Hardware It’s a suite of hardware - you have secure storage, you have one-time storage, you have hardware-accelerated cryptography. Security algorithms can be hardware-accelerated which combine to make a speedy and secure boot process. Part of it is the one-time fuses - these are specifically fuses.  Once they're blown, they cannot be unblown.  And there are fuses which you can [...]

Secure Boot on the iMX6 – Part 22018-10-09T10:35:09+00:00

Secure Boot on the iMX6 – Part 1

2018-10-09T10:30:58+00:00

With the proliferation of IoT – spanning just about everything from smart cities to wireless jewellery – the need to prioritise security in secure embedded systems has never been greater. The secure boot process is one of the foundation stones of software development best practice. It’s a complex, necessary part of your application’s anti-malware fortress. In this 3-part series, we’re taking an in-depth look at the secure boot protocol, and will also tell you our top tips for executing secure boot on one of the most popular processors in electronics – the i.MX6. Secure Boot - What It Is, Where You’d Use It What is Secure Boot? Secure boot is a process where your OS [Operating System] boot images and code are required to be authenticated against the hardware [...]

Secure Boot on the iMX6 – Part 12018-10-09T10:30:58+00:00