Cybersecurity Publications

FILTER BY:
logo

November 18th, 2025

Ensuring file integrity and authenticity on Linux using a Hardware Security Module

The French conference ‘Capitole du Libre’ is held every year in Toulouse, France. It covers many top ...

logo

June 25th, 2025

Rust in embedded systems: feedback on the development of a charging station for electric vehicles

With the aim of reducing development costs and cyber risks, two years ago we decided to switch fr ...

logo

May 15th, 2025

Cybersecurity and auditability of embedded systems - the case of an EV charger

The rapid adoption of complex connected embedded systems, such as electric vehicle (EV) charging sta ...

logo

May 15th, 2025

Mitigate cybersecurity/safety constraints with asymmetric multiprocessing

Asymmetric multiprocessing (AMP) leverages heterogeneous cortex integrated on a single System on Chi ...

logo

February 2nd, 2025

Lessons learned from integrating SBOM in a supply chain

In the context of a Linux software factory dedicated to building embedded software, we will discuss ...

logo

February 2nd, 2025

Lessons learned from deploying boot security features on embedded systems

Verifying the integrity of the entire boot process is today mandatory for embedded systems. Secure B ...

logo

December 3rd, 2024

HyGARDE: How We Secure Future Connected Embedded Systems

In a world where embedded systems are increasingly connected (cars, planes, trains, etc.), cybersecu ...

logo

October 4th, 2024

Feedback on the use of RUST/Linux in an electric vehicle charging station

Immerse yourself in the world of charging infrastructure for electric cars with this captivating pre ...

logo

February 9th, 2024

Tux-EVSE Ev-Charger & Cybersecurity

Presentation of cybersecurity challenges of an Electrical Vehicle charging station ISO 151118 in ...