What Does "Build Secure" Mean, Anyway?

Recently, the Cybersecurity and Infrastructure Security Agency (CISA) Director, Jen Easterly and Tom Fanning, Chair of CISA’s Cybersecurity Advisory Committee, released a blog discussing lessons learned from the Colonial Pipeline attack two years ago. After a healthy amount of self-promotion, Easterly and Fanning call for “security to be built into the creation of new technology – as a foundational imperative – rather than bolted on at the end requiring continuous security updates from consumers.”

Read More
Adam Fraser
The Future of Security at the Intelligent Edge

Working at Star Lab requires we give considerable thought to how security will evolve over time as it relates to intelligent systems.  Below are my predictions, with a small shameless plug for Star Lab’s approach. The trend in the 20s will be one that moves from Enterprise Influence, i.e, just apply current enterprise and cloud security solutions to the intelligent edge (IE), to Fight Through, where systems have the intelligence to automate attack discovery as well engage survival defenses such as reconfiguration and / or engaging response actions to minimize or neutralize the threat. 

Read More
Adam Fraser
What to Do About the New FDA Requirements: A CTO's Perspective

Finally, after a mere four and a half years in draft form, the FDA has released updated cyber security requirements for new (medical) devices seeking approval this fall.  These updated requirements highlight how medical devices are falling far behind other industries and are currently in a game of catch up. In what’s sure to be a fast paced and slightly chaotic version of catch up, medical device makers are currently faced with a slightly guided version of “choose your own adventure”, which let’s be honest here, is both good and bad. In the good column, device manufactures aren’t forced to use specific technologies or methodologies (unlike some other industries).

Read More
Jonathan Kline
Why Bother with Measured Boot?

Real system security is only effective with a measured boot design.  (No, this is not a blog entry about footwear…)

Although a lot of attention is placed on Operating System (OS) protections (SELinux, ASLR, etc.), these protections mean little if an attacker tampers with the OS early in the boot process.  For example, although SELinux is a powerful access-control mechanism, it can be disabled with a single boot argument passed via a bootloader.  OS runtime protections also mean little if an attacker can just remove the hard drive and edit configuration files offline without restriction.  A measured boot design can handle this attack too. 

Read More
Alex Olson
Takeaways from SKO 2023

As part of the Star Lab sales team, I attended the Wind River Annual Kick Off in early February.  As a “newbie” to the Star Lab team with only 4 months under my belt, I was attending with a high degree of curiosity about where our security solutions fit into the larger story of a company that has created embedded development tools for decades.

Read More
Dan Megan
A Step-by-Step Guide to Defend Against “Bring Your Own Filesystem” (BYOF) Attacks 

Bring your own filesystem (BYOF) attacks have become increasingly common. In a BYOF attack, an attacker delivers payloads to a target, as it minimizes their footprint and system-level interactions. From a practical perspective, how would (or could a system designer) defend against these attacks? Even more so, how can a system designer implement proper defenses to even prevent similar types of attacks in the future without just trying to plug all the possible holes retroactively. 

Read More
Linux, ProductsJonathan Kline
7 Tenets of Layered Security in Embedded Design

It's not fair.

When attacking an embedded system, it takes only one vulnerability to lead to an exploit, or at least an exploit chain. Of course, this all depends on what the attacker’s goals are in the first place.

This means, when tasked with securing an embedded system, the defender must think through and be prepared to protect against every possible vulnerability, across all layers of the system and overall architecture. Overlook just one opening and the attacker may find it, take control, steal your secrets, and create an exploit for others to use anytime, anywhere.

Read More
Jonathan Kline
A Walkthrough of Gitlab Artifact Cleanup (with code)

Like many companies, we run our own private gitlab server, and while it’s highly configurable, it doesn’t always meet our needs out of the box. Sometimes we have to automate complex tasks outside of the normal workflow. As we discovered, the complexity of a tool such as gitlab would necessitate interaction with its backend API in order to automate some fairly complex tasks.

Read More
Jonathan Kline