Adding SHA256 Digests to RPMs

Adding SHA256 Digests to RPMs

RPM Structure Overview The RPM package format, as used by RedHat Linux, CentOS and others provides multiple mechanisms for verifying package integrity and authenticity before installation. Mechanisms for integrity and authenticity include: MD5 and SHA1 hashes of the...
Nesting XenBlanket on AWS

Nesting XenBlanket on AWS

As a security company with a focus on utilizing hypervisor technology, the team at Star Lab wanted to research potential hypervisor-based solutions for cloud security. The demand for cloud services has skyrocketed worldwide, with an increasing amount of critical...
Encrypting in a Dangerous World

Encrypting in a Dangerous World

Suppose you have a very difficult threat model for your embedded system. Not only is your adversary technically skilled, but they are going to have physical access to your device.Maybe you are exporting a SCADA controller containing critical or trade secret data to a...
Designing for Isolation Using Virtualization

Designing for Isolation Using Virtualization

In October 2018, the GAO released a report on cyber vulnerabilities in weapons systems. This report highlights the need to consider cyber survivability in the weapons system design process. At Star Lab, we think virtualization is an enabling technology that...