-
Transitioning Cellular networks towards Post Quantum Cryptography
Telecommunication systems like 5G rely heavily on secure communication protocols based on asymmetric and symmetric cryptography to protect sensitive information, including user identities, voice, data, messages and network configurations.
-
UTopia: From Unit Tests To Fuzzing
Fuzzing, which is to test software with pseudo-random input and observe its execution for anomalous behavior, is an effective tool for finding real bugs and vulnerabilities within software.
-
mTower – for Quick Start with ARM TrustZone on MCU
Internet-of-Things (IoT) are everywhere in our daily life. They are used in our homes, in restaurants, at the factories, installed outdoors to control and to report the weather changes, prevent fires, and many more. However, all these may come at risks of security breaches and privacy issues.