Skip to content
  • Home
  • About Us
  • Services
  • Products
  • Blog
    • Firmware Analysis
    • Hardware Security
    • IoT Security
    • Embedded Security
  • Contacts
SecureVity Blog Trust.Protect.Secure
SecureVity Blog Trust.Protect.Secure
  • Home
  • About Us
  • Services
  • Products
  • Blog
    • Firmware Analysis
    • Hardware Security
    • IoT Security
    • Embedded Security
  • Contacts
Firmware Analysis

How To Locate JTAG on the PCB

1. What is JTAG? JTAG is a debugging and programming interface found on many microcontrollers, FPGAs, and processors....
SecureVity ResearcherJan 10, 2025
Hardware Security

How to Identifying JTAG and UART Pinouts on a PCB

The pinouts for JTAG and UART vary depending on the specific device or implementation, but there are standard...
SecureVity ResearcherJan 10, 2025
Embedded Security

OWASP IoT Top 10 (2018)

1. Weak, Guessable, or Hardcoded Passwords 2. Insecure Network Services 3. Insecure Ecosystem Interfaces 4. Lack of Secure...
SecureVity ResearcherJan 10, 2025
Firmware Analysis

Backdooring firmware

Backdooring firmware involves modifying the original firmware code to insert malicious functionality while maintaining its operational integrity. This...
SecureVity ResearcherJan 10, 2025
Firmware Analysis

Executing a firmware binary

Executing a firmware binary requires emulating or replicating the environment in which the binary was designed to run....
SecureVity ResearcherJan 10, 2025
Firmware Analysis

Firmware file extensions

Firmware files come in various formats, often specific to the platform, architecture, or device being updated. These file...
SecureVity ResearcherJan 10, 2025
Hardware Security

Side-Channel Attacks (SCAs)

Side-Channel Attacks (SCAs) are a class of attacks that exploit unintended information leakage from a system to compromise...
SecureVity ResearcherJan 10, 2025Jan 10, 2025
Embedded Security

Secure Boot

Secure Boot is a security feature designed to ensure that only trusted and authenticated firmware and software can...
SecureVity ResearcherJan 10, 2025Jan 10, 2025
Firmware Analysis

Embedded Device Architectures

Embedded devices and IoT devices are designed with a range of architectures tailored to their performance, power, and...
SecureVity ResearcherJan 10, 2025Jan 10, 2025
Firmware Analysis

Connectors and Communication interfaces-Pin Counts:

Here’s a list of pin counts for various commonly used connectors and communication interfaces: 1. JTAG (Joint Test...
SecureVity ResearcherJan 10, 2025Jan 10, 2025
123
    Copyright © 2025    Yuki Ever Blog Theme Designed By WP Moose