In this article, we will deep dive into the major concepts behind random numbers and learn how to work with them on a Linux system.| sergioprado.blog
In this article, we will learn how to debug the Linux kernel on an embedded Linux system with GDB.| sergioprado.blog
TPM (Trusted Platform Module) is an international standard that enables trust in computing platforms in general, providing several security-related features for computer systems, including hashing, encryption, signing, random number generation, and many more!| sergioprado.blog
In this article, we will learn the basic concepts of SBOM (Software Bill of Materials) and how it can be generated and managed on embedded Linux with the Yocto Project.| sergioprado.blog
This article is an introduction to encryption for embedded Linux developers.| sergioprado.blog
List of talks I have presented in recent years, including links to slides and recording, when available:| sergioprado.blog
This article is an introduction to embedded Android from the perspective of an embedded Linux developer.| sergioprado.blog
This article is going to be an introduction to embedded Linux security.| sergioprado.blog
The Embedded Online Conference is an online conference for embedded systems, DSP, machine learning and FPGA engineers and it is starting today May 20th 2020.| sergioprado.blog
Have you ever wondered how the Linux kernel is tested?| sergioprado.blog
A Trusted Execution Environment (TEE) is an environment where the code executed and the data accessed is isolated and protected in terms of confidentiality (no one have access to the data) and integrity (no one can change the code and its behavior).| sergioprado.blog
Last week, from February 25th to 27th in Nuremberg, Germany, we had another edition of Embedded World, the leading international fair for embedded systems.| sergioprado.blog
A few days ago I decided to reverse engineer my router’s firmware image with binwalk.| sergioprado.blog
The Embedded Online Conference is an online conference for embedded systems, DSP, machine learning and FPGA engineers.| sergioprado.blog
The slides and video of my talk at Embedded Linux Conference Europe 2019 are available.| sergioprado.blog
In this article, we will learn how asymmetric-key encryption and digital signatures work from a practical perspective.| sergioprado.blog
In this article, we will learn how symmetric-key encryption works from a practical perspective.| sergioprado.blog
This is the second part of the article about embedded Linux security.| sergioprado.blog
Do you know there is a dedicated partition in the eMMC called RPMB that makes it possible to store data with integrity and authenticity support?| sergioprado.blog
The GNU Compiler Collection (GCC) provides several language features not found in ISO standard C.| sergioprado.blog
Would it be a good idea to use containers on an embedded Linux system?| sergioprado.blog
JTAG is a physical hardware interface that makes it possible, among other things, to extract the firmware image from electronic devices.| sergioprado.blog
From February 25th to 27th in Nuremberg, Germany, we will have another edition of Embedded World, the leading international fair for embedded systems.| sergioprado.blog
The best way to spend less time fixing bugs in software is not creating bugs in the first place, and a static analysis tool is perfect for this job.| sergioprado.blog
AddressSanitizer (ASan) is an instrumentation tool created by Google security researchers to identify memory access problems in C and C++ programs.| sergioprado.blog
Tracing is a useful technique to find bugs in software, and ftrace is the tracing framework built into the Linux kernel.| sergioprado.blog
Container technology in general and Linux containers, in particular, have become increasingly popular in recent years.| sergioprado.blog
Since version 4.8 the Linux kernel has a new interface based on character devices for accessing and managing GPIO lines in user space.| sergioprado.blog
One of the most effective ways to identify problems in applications that crash is through core dump analysis.| sergioprado.blog
This is going to be my new blog about embedded systems development.| sergioprado.blog
My name is Sergio Prado and I am from São Paulo, Brazil.| sergioprado.blog