Recent developments in healthcare have resulted in the combination of medical devices and the Internet-of-Things (IoT). With medical devices underlying special regulations and used in very specific contexts, the question arises how security assessments can be performed to address the sector-specific demands. This is the first post of our new IoT healthcare security series.
Control groups are another major building block of today’s Linux containers. The goal of cgroups is to enable fine-grained control over resources consumed by processes additionally to resource monitoring. This post of our container series informs about the basics regarding this kernel primitive.
Security analysis of embedded systems on the Printed Circuit Board (PCB) level can be a very tedious and time-consuming task. Many steps like visual PCB inspection and reverse engineering of security relevant nets, i.e. electrically connected components, is usually done manually by an embedded security expert. PROBoter aims at automating this manual analysis.