Improving Embedded Operating System Security Part 5: Securing Code and Data
Secure the Boot and Execution Embedded systems are vulnerable at boot time. For example, it’s common for hobbyists to re-flash consumer products’ firmware to change the way it...
12 years 10 months ago