Rising Threats From Differential Power Analysis

Differential power analysis (DPA) has been a threat vector on the chip landscape for a number of years. It was discovered around the mid 1990s by the teams at [getentity id="22671" e_name="Rambus"]’ Cryptography Research Division, and turned out to be a very effective tool for compromising the ubiquitous SIM card environment. “The most traditional market for DPA has been with smart cards... » read more

Week 41: The Rise Of Security At DAC

All potential attendees interested in security topics should know one thing—the Wednesday keynote on hacking automobiles, while sure to be compelling, will only scratch the surface of security-related content at DAC. Another presenter will talk about how increasing demand for “connected life on the go” and “Internet-enabled everything” opens up a wide variety of security issues for Io... » read more

Defending Against Reverse Engineering

Most of us are familiar with the term “reverse engineering.” We generally know that it is used to extract data or designs from chips, but exactly how is pretty much a mystery. Today, chip security has very broad implications. The landscape of tomorrow will be cluttered with devices that are microprocessor-controlled, including some that are autonomous. Numbers vary, but the current esti... » read more

R-FPGA Security Risks

Configurable chips have been around for a long time. Modern FPGAs, E/EEPROMS and other types of programmable memory have allowed us some flexibility in changing chip functionality in the field. But really, this is static reprogramming and requires a process and procedure. Moreover, it needs to done by knowledgeable programmers, either on site or remotely. But the fact remains that field re-prog... » read more

Keep Your Friends Close And Your Smart Cards Closer

I recently had a conversation with Ramesh Karri, professor of electrical engineering and the chair of this year’s security track at DAC. I was discussing, with him, the current state of chip compromise techniques and how this segment is growing by leaps and bounds. Every day it seems there are more and more malcontents bent on finding ways to compromise every type of smart card out there. And... » read more

It’s All IP In An SoC

[getkc id="43" comment="IP"] (IP) has become the major building blocks of complex, highly integrated systems on chips ([getkc id="81" kc_name="SoC"]s), which are found in almost every modern, intelligent electronic device. They have evolved into a one-chip solution that manages many to all of the functions, features, and applications that are found in the ubiquitous sea of today’s electronic... » read more

Locking Down The Chip

The crypto processor is poised to break into the mainstream SoC world. Lower costs for manufacturing, coupled with rising security concerns from increased connectivity and growing complexity have cracked open the door on this approach to locking down a chip. Crypto processors aren’t a new concept, but they generally have been reserved for high-end applications. Until recently, they have ju... » read more