RunSafe Alkemist Now Protects Yocto Builds from Memory Exploits

By Brandon Lewis

Editor-in-Chief

Embedded Computing Design

June 03, 2020

News

RunSafe Alkemist Now Protects Yocto Builds from Memory Exploits

Alkemist uses a procedure called load-time function randomization (LFR), which restacks functions in memory before a process starts to execute in order to create a higher degree of memory diversity.

RunSafe Security has added integration support for Yocto Project distributions to Alkemist, a security solution that leverages remotely deployable binary protection mechanisms to defend against memory corruption exploits. Yocto developers can now simply add a layer into their build environments to support Alkemist without ever modifying a line of code or delaying releases.

Alkemist helps reduce the attack surface of Yocto-built embedded systems, which contain identical images that mean a single vulnerability could potentially impact thousands of systems. Alkemist does this through a procedure called load-time function randomization (LFR), which restacks functions in memory before a process starts to execute in order to create a higher degree of memory diversity.

For more information, visit https://runsafesecurity.com/yocto/.

Brandon is responsible for guiding content strategy, editorial direction, and community engagement across the Embedded Computing Design ecosystem. A 10-year veteran of the electronics media industry, he enjoys covering topics ranging from development kits to cybersecurity and tech business models. Brandon received a BA in English Literature from Arizona State University, where he graduated cum laude. He can be reached at [email protected].

More from Brandon