Published at May 20, 2025 · 30 min read

This post will introduce some of the very popular attacks that target electronic devices - the RAM attacks, but the main topic will be the verification of ram-wipe software solution protection from the attacks....
Categories: security
Diving deep into Linux DRM bridge chaining
Published at February 12, 2024 · 14 min read

The post describes the story of implementing bridge-chaining using the DRM/KMS Linux Kernel system on an embedded device with i.mx8mmini SoC...
Categories: firmware miscellaneous