Next-Gen Botnets

Botnets, once limited to computer networks, are expanding and changing as more devices are connected to the Internet—and becoming much harder to detect and destroy. The term botnet—a contraction for robotic networks—conjures up the days when it was just a collection of computers that were largely autonomous, on a local network and usually assigned to repetitive tasks. But that is chang... » read more

White-Box Crypto Gains Traction

Ask any cryptography expert which is better, hardware- or software-based cryptography, and they'll almost always choose the hardware. But as the IoE begins to take root in cost-sensitive markets with tight market windows, that won't always be an option. Plan B is software cryptography, which historically has been used at the application level in the form of anti-virus, anti-spyware, and soft... » read more

Smarter Cities

One of the benefits touted by IoE proponents is that smart cities will improve the quality of life and make cities more “livable.” The concept is appealing, and if it comes to pass as visionaries hope, the smart city of the future will be a virtual cornucopia of convenience and efficiency. Residents and vistors will never be lost with the proliferation of location technologies, which als... » read more

The Rise Of Dynamic Networks

The Internet of the future, and particularly the [getkc id="260" comment="Internet of Everything"], will be interlaced with millions if not billions of intelligent, dynamic, self-organizing networks. These networks will be full of elements that are capable of autonomic self-registration across these multitudes of networks. It is one thing to put up a security perimeter when you know who the... » read more

Rising Threats From Differential Power Analysis

Differential power analysis (DPA) has been a threat vector on the chip landscape for a number of years. It was discovered around the mid 1990s by the teams at [getentity id="22671" e_name="Rambus"]’ Cryptography Research Division, and turned out to be a very effective tool for compromising the ubiquitous SIM card environment. “The most traditional market for DPA has been with smart cards... » read more

Lightweight Cryptography For The IoE

This is the age where technology is expected to do more, faster, anonymously, and often invisibly. And it's supposed to use less power, with smaller footprints, unobtrusively and intuitively. And all that needs to be protected with cryptography. That's the goal, at least. But as Simon Blake-Wilson, vice president of products and marketing for [getentity id="22671" e_name="Rambus"]' Cryptogra... » read more

Emerging Security Protocols

As the proliferation of mobile devices ramps up at escalating rates, securing these devices and the infrastructure they run on is becoming a top priority for both the hardware and the data that swirls within it. Traditional security platforms such as firewalls and antivirus programs are still a viable part of the security envelope, but the rapid emergence of zero-day/hour threats is somethin... » read more

Security Risk Escalating In 2015

Never has there been a more committed effort for malevolent entities to try to leak data, damage infrastructures, and wreak havoc on data essential to our lives. And never has there been a more opportunistic time for the security industry to put their best effort forward and answer the malfeasance challenge. So what is the current state of cyber security? "Unfortunately, there isn’t a l... » read more

ChaoLogix: Integrated Security

Semiconductor Engineering sat down with ChaoLogix’s chairman and CEO, Brian Kelly, and Chowdary Yanamadala, senior vice president of business development, to talk about the company's approach to securing semiconductors from side-channel attacks. SE: Given that the term “data security” has almost as many definition as there are braches, let start with a basic question: What does data s... » read more

DNA For Cryptography Chips

Counterfeit chips are here to stay. There are all kinds of reasons they should never be used, but certain segments of the chip market have more critical fallout from such chips than others. In most cases counterfeit chip use is unintentional. It simply goes undetected in the vast supply chain, sometimes with life-threatening repercussions. But whether in life-safety or low-end consumer produ... » read more

← Older posts