In this article, we will deep dive into the major concepts behind random numbers and learn how to work with them on a Linux system.| sergioprado.blog
In this article, we will learn how to debug the Linux kernel on an embedded Linux system with GDB.| sergioprado.blog
This article is an introduction to embedded Android from the perspective of an embedded Linux developer.| sergioprado.blog
This article is going to be an introduction to embedded Linux security.| sergioprado.blog
A Trusted Execution Environment (TEE) is an environment where the code executed and the data accessed is isolated and protected in terms of confidentiality (no one have access to the data) and integrity (no one can change the code and its behavior).| sergioprado.blog
This is the second part of the article about embedded Linux security.| sergioprado.blog
The GNU Compiler Collection (GCC) provides several language features not found in ISO standard C.| sergioprado.blog
JTAG is a physical hardware interface that makes it possible, among other things, to extract the firmware image from electronic devices.| sergioprado.blog
The best way to spend less time fixing bugs in software is not creating bugs in the first place, and a static analysis tool is perfect for this job.| sergioprado.blog
AddressSanitizer (ASan) is an instrumentation tool created by Google security researchers to identify memory access problems in C and C++ programs.| sergioprado.blog
One of the most effective ways to identify problems in applications that crash is through core dump analysis.| sergioprado.blog