Welcome to our Site!

Security Engineering is a research group based in Peshawar, Pakistan specializing in security and service oriented architectures related areas. Our areas of focus are Remote attestation via Trusted Computing standards on ubiquitous and mobile platforms. Our research proposes behavioral paradigm for remote attestation. The purpose of this blog i...Read More

This is a very confusing thing to understand and search for in the first place but once you get to understand how the OE workflow works then one can make such adjustments. Here I will give you a quick start on how to do it. I assume that you will be dealing with shr-unstable build in OE. My working...

Read All

I am assuming we are working with SHR as our prefered distro. cd /home/moko/shr-unstable Chose your preferred editor …. in my case it was vim. vi conf/auto.conf change the MACHINE = “om-gta02″ to “qemuarm” or any of your choice from /home/shaz/moko/shr-unstable/openembedded/conf/machine....

Read All
Principles of Isolation – Part 1
October 19th, 2010 By shazkhan

This is part 1 in a series of 3 short essays to introduce the reader to the principles of isolation in distributed information systems. Any typical information system is by nature a distributed application/system. Therefore we have a client side, a server side and a means of communication. As an...

Read All
Introduction to OpenCA
October 19th, 2010 By shazkhan

Public Key Infrastructures (PKIs) are one of the most widely accepted must have of the future. Most applications can be secured with certificates and keys but it is really difficult and expensive to setup PKIs, the reason being that flexible trust-center...

Read All
Introduction to OpenXPKI
October 19th, 2010 By shazkhan

OpenXPKI aims to be an enterprise-scale Public Key Infrastructure (PKI) solution, which supports well established infrastructure components like RDBMS and Hardware Security Modules (HSMs). It is the successor of OpenCA, and builds on the experience gained while developing it as well as on our...

Read All

Public key infrastructure (PKI) consists of programs, data formats, procedures, communication protocols, security policies, and public key cryptographic mechanisms working in a comprehensive manner to enable a wide range of dispersed people to communicate in a secure and predictable fashion....

Read All

Earlier software tokens were considered weak against malicious activities because the chain of trust could not be established by putting trust on software available at the runtime of the token usage. These days software tokens have become more effective as the available hardware tokens, aka hardware...

Read All
OpenERP Module Development Part-1
September 2nd, 2010 By mir.nauman

We will start by creating a simple OpenERP module with only one form and one table in PostgreSQL database with no relations at all. Later on we will extend this simple module in more complex module with multiple forms, multiple tables and relations step by step. I assume that u have installed OpenERP...

Read All