top of page


Linux kernel Hardening
The Linux kernel is a quite BIG thing which grows since the beginning of 90's with more than a million of commits and thousands of different contributors. Its portability (x86, ARM, MIPS, RISC-V...) and its scalability allow its usage on various hardware platforms from the simplest embedded system to the most powerful server. Given its vital role, its large attack surface, and the considerable number of identified vulnerabilities, vendors have no choice but to secure their ke
Michaël Grand
Jan 515 min read


Secure remote access with Yocto
Most embedded system vendors addressing the B2B market want to be able to remotely debug faulting devices to shorten their remediation delays and save some money. Unfortunately, this often results in allowing root (or any other privileged user) to log in via the SSH port. This article explain how SSH certificates and sudo can be used to secure a remote SSH connection.
Michaël Grand
Sep 4, 20258 min read


Efficient management of CVEs with Yocto
How to efficiently manage CVEs using Yocto and other open-sources tools.
Michaël Grand
Aug 4, 20255 min read
bottom of page