The New Frontier in Information Security: Hardware Based Security (pdf)
[gview file=”http://prplfoundation.org/wp-content/uploads/2015/08/prpl-imgtec-summit-2015-v3-2.pdf”%5D
Secure Boot Overview for prpl Foundation S-PEG
[gview file=”http://prplfoundation.org/wp-content/uploads/2015/08/secure-boot-overview-for-prpl-foundation-s-peg.pdf”%5D
prpl Hypervisor Overview
[gview file=”http://prplfoundation.org/wp-content/uploads/2015/08/prpl-hypervisor-overview-2015-05.pdf”%5D
MIPS Virtualization & Security
[gview file=”http://prplfoundation.org/wp-content/uploads/2015/08/mips-virtualization_security_prpl_peg_apr2015.pdf”%5D
Security Working Group Members' Goals and Interests
[gview file=”http://prplfoundation.org/wp-content/uploads/2015/08/prpl-members-goals-and-interests-2015-v1-1.pdf”%5D
A hypervisor approach with real-time support to the MIPS M5150 processor (presentation)
[gview file=”http://prplfoundation.org/wp-content/uploads/2015/08/isqed2015.pdf”%5D
A hypervisor approach with real-time support to the MIPS M5150 processor (paper)
[gview file=”http://prplfoundation.org/wp-content/uploads/2015/08/isqed2015-2.pdf”%5D
Secure Containers
[gview file=”http://prplfoundation.org/wp-content/uploads/2015/08/security__virtualization_-_initial_presentation.pdf”%5D
An introduction to the prpl foundation
An introduction to the prpl foundation from Imagination Technologies The prpl foundation is an open-source, community-driven, collaborative, organization. It mainly targets and supports the MIPS architecture – but it is open to all –, with…
Getting Hacked Via Your Fridge Or, The IoT Security Imperative
IoT Security Imperative: Stop your Fridge from Sending you Spam We’ve all heard the continuing news about or been victims of hacked passwords, data breaches, identity theft and lost privacy, because our heavy reliance on…
You must be logged in to post a comment.