12 Apr, 23 | Device Evaluation
Marc Witteman shares his thoughts on the latest developments in secure Post Quantum Crypto
02 Feb, 22 | Device Evaluation
Considering the changes in the security landscape, the new IoT target Riscuberry serves multiple purposes. Riscuberry is not only an up-to-date target for embedded security training but also a ...
14 Apr, 21 | Device Evaluation
In this blog post, Riscure’s security analyst Naasa Fikri and senior trainer/senior security analyst Yashin Mehaboobe illustrate a common approach for a light security assessment of smart home ...
30 Mar, 21 | Device Evaluation
In our previous two blog posts, we first introduced Samsung’s TEE OS TEEGRIS and then showed how to exploit a Trusted Application (TA) and gain runtime control.
12 Mar, 21 | Device Evaluation
In this second blog post, we will continue to explore TEEGRIS by reverse engineering TAs in order to identify and exploit vulnerabilities.
23 Feb, 21 | Device Evaluation
The goal of our investigation was to assess how strong Samsung’s TEE security OS is and whether it can be compromised to obtain runtime control and extract all protected assets, allowing, e.g. ...
21 Jan, 20 | Device Evaluation
Setting priorities right is very important when it comes to security. As a developer of a software and/or hardware solution, you simply cannot chase every single bug or design issue. If you know ...
24 May, 19 | Device Evaluation
Justin is on the phone with Alex from Riscure, discussing how to address security requirements from the OEM. After some minutes, Justin realized he needs to align with Chris from the OEM on what ...
10 May, 19 | Device Evaluation
Justin, the OEM and the automotive cybersecurity requirements: Part 2