What are the relevant CVEs and responses from chip manufacturers?
 https://en.wikipedia.org/wiki/Trusted_Platform_Module  http://blog.onboardsecurity.com/blog/trusted-computing-primary-use-cases  http://tpm.fail/  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11090  https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16863  https://www.st.com/content/st_com/en/campaigns/tpm-update.html
|Embedded Linux: From Systems Architecture to Real-Time|
The next public version of
Our in-depth introduction to Embedded GNU/Linuxwhich will take place on 12th of Sept 2019 in English.
Course ObjectivesTo provide an understanding of the essentials of embedded GNU/Linux, how the bits and pieces fit together. What components are needed to build an embedded GNU/Linux system, where to get them from and how to configure/build/install them? Where to get help from? What about those software licenses? Hands-on exercises provide you with the necessary practical experience to go ahead and develop your own embedded GNU/Linux systems after completing this training successfully.
DescriptionThis five day training class uses hands-on exercises combined with instruction to illustrate the concepts of embedded GNU/Linux. It is designed to bring you quickly up to speed. The philosophy, concepts and commands necessary to make effective use of GNU/Linux are described through a combination of theory and on-the-job training. Don't reinvent the wheel, but learn from an experienced trainer and take home a working knowledge of GNU/Linux and the ability to use it effectively in your own embedded development project.
For more details check here
(optionally) Delivered asIn case you can not make it to the live session in Munich, you might want to join remotely (with) possibly limited hands-on experience during the training, but you get all the training material and examples so you can do the excercises on your own.
Check out our other trainings
If you have any questions, I will be pleased to answer them here.
To stay informed about our FreeRTOS trainings make sure you are subscribed here.
For information about our (Embedded) Linux trainings make sure you are subscribed here.
Some of the true craftsmanship in the world we take for granted. One of these things is the common tools on Linux, like ps and ls. Even though the commands might be perceived as simple, there is more to it when looking under the hood. This is where ELF or the Executable and Linkable Format comes in. A file format that used a lot, yet truly understood by only a few. Let’s get this understanding with this introduction tutorial!
Most likely you know "The Good, the Bad and the Ugly Theme by Ennio Morricone".
Let's try to apply this catchy title in reverse order to U-Boot release 2018.11.
mkimagetool, which is part of the U-Boot distribution, is used e.g. to produce the legacy uImage kernel or newer uImage.FIT images. uImage contains a U-Boot header, which is supposed to be backwards compatible to the beginning of time. Well that's the theory. If something changes in a U-Boot release in this U-Boot header your favorite boot loader thinks it loads the wrong image type in case U-Boot and
mkimageare built with different U-Boot versions. This is what's the case with U-Boot release 2018.11. So you might want to be careful if you use it. This patch
Signed-off-by: Robert Bergerrestores backwards compatibility.
CONFIG_DMand if they don't use
Why teach security in a programming languages course? Doesn’t it belong in, well, a security course?
It’s every system administrator’s worst nightmare. Hackers gain access to your system, stealing mission-critical information, locking sensitive files, or leaking proprietary information to the public.