Cybersecurity Publications

November 18th, 2025
Ensuring file integrity and authenticity on Linux using a Hardware Security Module
The French conference ‘Capitole du Libre’ is held every year in Toulouse, France. It covers many top ...

June 25th, 2025
Rust in embedded systems: feedback on the development of a charging station for electric vehicles
With the aim of reducing development costs and cyber risks, two years ago we decided to switch fr ...
May 15th, 2025
Cybersecurity and auditability of embedded systems - the case of an EV charger
The rapid adoption of complex connected embedded systems, such as electric vehicle (EV) charging sta ...
May 15th, 2025
Mitigate cybersecurity/safety constraints with asymmetric multiprocessing
Asymmetric multiprocessing (AMP) leverages heterogeneous cortex integrated on a single System on Chi ...
February 2nd, 2025
Lessons learned from integrating SBOM in a supply chain
In the context of a Linux software factory dedicated to building embedded software, we will discuss ...
February 2nd, 2025
Lessons learned from deploying boot security features on embedded systems
Verifying the integrity of the entire boot process is today mandatory for embedded systems. Secure B ...

December 3rd, 2024
HyGARDE: How We Secure Future Connected Embedded Systems
In a world where embedded systems are increasingly connected (cars, planes, trains, etc.), cybersecu ...

October 4th, 2024
Feedback on the use of RUST/Linux in an electric vehicle charging station
Immerse yourself in the world of charging infrastructure for electric cars with this captivating pre ...

February 9th, 2024
Tux-EVSE Ev-Charger & Cybersecurity
Presentation of cybersecurity challenges of an Electrical Vehicle charging station ISO 151118 in ...
