Last week at ESE Kongress - Embedded Software Engineering Kongress, a short recap: 🦀 Is #Rust the new C++? Implementing in Rust is becoming more and more attractive in embedded software development. 🔐 #Cybersecurity took centre stage, especially in discussions around the Cyber Resilience Act. 🤖 Much attention was paid to the growing role of #AI in embedded systems. A big thank you to Andy Walter, Christopher Hablitzel and Justina Krawczyk for representing us at the booth and engaging in insightful conversations about #embeddedsoftware development, especially regarding Rust! 🙌 Whether it’s about understanding benefits of using Rust, tackling cybersecurity challenges, or integrating AI into embedded environments, we’re here to help you navigate the complexities. Get in touch: https://lnkd.in/dJGce6ys Photo credits: Nicolas Det
Cloudflight’s Post
More Relevant Posts
-
🌟 Exciting News! 🌟 I'm thrilled to share that I've recently developed a simple yet powerful tool—a port scanner! 🎉 This Python-based script scans a range of ports (50-85) to identify open ones. It translates hostnames to IPv4 addresses using 'socket.gethostbyname()', and employs 'socket' connections with a timeout of 1 second per port. The script prints open ports, enhancing network security and management. Working on this project has been a rewarding experience, deepening my understanding of network protocols and socket programming. Looking forward to taking on more challenges in the tech world! 🚀 #TechInnovation #CyberSecurity #CodingJourney #ProudMomentt
To view or add a comment, sign in
-
🔭 Future-ready #software is built with languages that are efficient and secure🔐. In engineering terms, we're talking about memory-safe languages like Rust. We're excited to see the Office of the National Cyber Director (#ONCD) push this issue to the forefront with their statement on memory-safe software. As Rust enthusiasts (we have a collective 100 years of Rust experience at Ferrous Systems!) – we've been pushing Rust into new spaces where security is paramount. It's why we qualified the Rust compiler with Ferrocene for the #automotive and industrial development space. Read more about why the #WhiteHouse is calling for memory-safety in the official statement 👉 https://lnkd.in/gVjyFsAv And if you want to use #RustLang – a memory-safe language! – in your organization, we'll help you get started 📧 https://lnkd.in/eSzqzsgx Not sure how Rust is being used in practical applications? Then we hope to see you at OxidizeConf in May, where we'll be talking about all the ways Rust is being used. #memorysafe #development #cybersecurity #WhiteHouse #iso26262 #iec61850 #RustTrainings #LearnRust
To view or add a comment, sign in
-
Last weekend, I had the pleasure of participating in the DownUnderCTF with Haeata Balfour Ash , Jarryd W. , and Owen Williams ! It was incredibly fun, allowing us to delve into various canonical security vulnerabilities. For those unfamiliar, a Capture The Flag (CTF) event is a cybersecurity competition where participants solve a series of challenges to find hidden "flags" (specific pieces of text). These challenges can range from cryptography and networking to reverse engineering. This was my first CTF event and my first time tackling these kinds of challenges outside of the classroom (shout-out INFO2222 @ University of Sydney ). Given that we, as developers, often focus our efforts specialising in specific areas, such as front-end or back-end development, CTF events are fantastic for broadening technical skills across the entire field of computing. I particularly enjoyed the challenge "vector overflow" , which had my gdb debugging skills and knowledge of how c programs actually look in memory put to the test. It also taught me about the memory layout of a cpp vector object on the stack, and how it can be manipulated with a buffer overflow. Importantly a CTF event makes you a better defensive programmer, by showing how common vulnerabilities can arise from poor programming practices. Participating in a CTF event has reminded me how important it is to keep challenging myself and to stay updated with different aspects of cybersecurity and computing. I highly recommend CTFs for anyone looking to enhance their technical skills and cybersecurity knowledge, and have some fun along the way! Have you ever participated in a CTF?
To view or add a comment, sign in
-
Hola connections, Excited to share my latest project: A Simple Image Encryption Tool! I've developed an image encryption tool that uses pixel manipulation techniques, such as swapping pixel values and applying mathematical operations, to encrypt and decrypt images. This approach allows secure image handling with a user-friendly experience! Key Features: 1. Pixel value swapping for enhanced security 2. Basic mathematical operations for encryption 3. Simple decryption for easy access This project highlights the potential of creative coding for data security! View my work using the github link: https://lnkd.in/gkTXNKNC Prodigy InfoTech #Cybersecurity #ImageEncryption #PixelManipulation #Programming #TechInnovation #DataProtection #PRODIGYINFOTECH #SECURITY
To view or add a comment, sign in
-
Office of the National Cyber Director did you mean to publish this, or did it somehow leak out before it was fully baked? - Glaringly neglected is any discussion of concurrency, one of the most challenging aspects of software development, and one of the greatest contributors to non-determinism. - Modern C++ applications are written with automatic memory management, eliminating a large class of memory vulnerabilities. C and C++ are widely used in reliable SIL4 systems, including the space systems you reference. Rust does have compelling advantages in type and memory safety but it doesn't address everything. - Formal models of computation is another critical consideration beyond just programming languages. For example, safety-critical statecharts are used in DO 178-C compliant SIL4 software that is flying today. In space. I look forward to understanding your reference to Apollo 13, and to reading the complete paragraph that was intended to begin page 13.
Final-ONCD-Technical-Report.pdf
whitehouse.gov
To view or add a comment, sign in
-
🚀 **Excited to Share My Latest Project!** 🚀 I've just completed a simple yet effective image encryption tool that leverages basic pixel manipulation techniques! This tool enables users to encrypt and decrypt images using operations like pixel value swapping and mathematical transformations. By transforming pixel data, it ensures secure image handling with straightforward methods, making encryption accessible for educational purposes and foundational security applications. Dive into the code and see how basic algorithms can provide robust solutions in digital security. Looking forward to any feedback or discussions on enhancing this tool further! #ImageEncryption #CyberSecurity #Programming #TechProjects
To view or add a comment, sign in
-
Eliminate memory safety vulnerabilities with a CHERI pure capability Ada runtime on Morello. The Ada language plus Ada runtime constraint checks already eliminate the majority of memory safety violations. For the rare occasions when you need to operate outside of the safe aspects of the language, GNAT Pro for Morello propagates triggered CHERI hardware capability faults to Ada runtime software exception handlers. This unique GNAT Pro feature allows for cyber resilience + cyber recovery, vulnerability logging and fail-secure-but-degraded. These concepts are unachievable with bare-metal Rust, C or C++. Don’t settle for anything less. The formula is simple: Memory-safe languages + memory-safe hardware = reduced lifecycle costs, safer and more secure systems and happier customers. Already picked the world-leading software engineering language, Ada, to develop your application? Porting Ada code to CHERI CPU architectures is low effort. Often no effort. In addition, leverage CHERI’s advanced memory violation detection feature by cross-compiling to GNAT Pro Morello and executing existing verification suites on GNAT Emulator for Morello. Find bugs undetectable by ASAN and Valgrind. Incorporate the verification into a CI pipeline for continuous assurance. We do! Get in touch if you want to learn more. #GNATPro_CHERI AdaCore
🔊 Catchup on the latest article from Infosecurity Magazine on how The "White House Urges Tech Industry to Eliminate Memory Safety Vulnerabilities" The White House has called on the tech industry to adopt memory safe programming languages, eliminating most memory safety vulnerabilities from hardware and software. The report by the Office of the National Cyber Director (ONCD) noted that memory safety vulnerabilities are one of the “most pervasive” classes of bugs. We are delighted to see the University of Cambridge's #CHERI (Capability Hardware Enhanced RISC Instructions) getting mentioned over current commercial memory safety techniques like MTE in the technical report attached to the White House press release: “Future Software Should Be Memory Safe”. The report “Back to the building blocks: a path toward secure and measurable software” recommends CHERI over MTE. Read more on this 👉 https://bit.ly/3wBPtEp James Coker UK Research and Innovation Innovate UK Arm Department for Science, Innovation and Technology Digital Catapult The University of Edinburgh SRI US Federal Government
White House Urges Tech Industry to Eliminate Memory Safety Vulnerabili
infosecurity-magazine.com
To view or add a comment, sign in
-
Return-oriented programming poses a big threat to system defenses by exploiting existing executable code in memory, allowing attackers to bypass common mitigations, said Bramwell Brizendine, an assistant professor at The University of Alabama in Huntsville: https://lnkd.in/evV-HvDD "You have to pinpoint specifically which process you're going to attack, so that requires you to be able to somehow identify that. Traditionally, you would need to have some type of string comparison when you're doing that with return-oriented programming, which can be difficult because you're limited to only a certain small set of gadgets that the attack surface can support," Brizendine told Information Security Media Group (ISMG). #ISMGstudio
Navigating Security Threats With Return-Oriented Programming
inforisktoday.com
To view or add a comment, sign in
-
🔊 Catchup on the latest article from Infosecurity Magazine on how The "White House Urges Tech Industry to Eliminate Memory Safety Vulnerabilities" The White House has called on the tech industry to adopt memory safe programming languages, eliminating most memory safety vulnerabilities from hardware and software. The report by the Office of the National Cyber Director (ONCD) noted that memory safety vulnerabilities are one of the “most pervasive” classes of bugs. We are delighted to see the University of Cambridge's #CHERI (Capability Hardware Enhanced RISC Instructions) getting mentioned over current commercial memory safety techniques like MTE in the technical report attached to the White House press release: “Future Software Should Be Memory Safe”. The report “Back to the building blocks: a path toward secure and measurable software” recommends CHERI over MTE. Read more on this 👉 https://bit.ly/3wBPtEp James Coker UK Research and Innovation Innovate UK Arm Department for Science, Innovation and Technology Digital Catapult The University of Edinburgh SRI US Federal Government
White House Urges Tech Industry to Eliminate Memory Safety Vulnerabili
infosecurity-magazine.com
To view or add a comment, sign in
21,897 followers