Latest posts

highlight shape
Security Encryption

Asymmetric-Key Encryption and Digital Signatures in Practice

  • Sergio Prado
  • January 18, 2023

In this article, we will learn how asymmetric-key encryption and digital signatures work from a practical perspective.

Learn More details
Security Encryption

A hands-on approach to symmetric-key encryption

  • Sergio Prado
  • January 3, 2023

In this article, we will learn how symmetric-key encryption works from a practical perspective.

Learn More details
Linux Security

Introduction to encryption for embedded Linux developers

  • Sergio Prado
  • December 12, 2022

This article is an introduction to encryption for embedded Linux developers.

Learn More details
Android

What differs Android from other Linux based systems?

  • Sergio Prado
  • April 5, 2021

This article is an introduction to embedded Android from the perspective of an embedded Linux developer.

Learn More details
Security Linux

Introduction to Embedded Linux Security - part 2

  • Sergio Prado
  • November 7, 2020

In this article, we will cover techniques to improve the security of an embedded Linux device, including secure coding, static analysis tools, runtime protections, fuzzing tools, permissions, Linux capabilities, Mandatory Access Control, sandboxing, update system and network security.

Learn More details
Security Linux

Introduction to Embedded Linux Security - part 1

  • Sergio Prado
  • September 6, 2020

In this article, we will have a small introduction to security concepts and threat modeling and then focus on some mitigation techniques to improve the security of an embedded Linux device, including secure boot, code/data encryption and secure key storage.

Learn More details

Newsletter

Subscribe to the Embedded Labworks newsletter to receive messages about training, services and news from the embedded systems industry.

highlight shape