Data Leakage And The IIoT


The Internet of Things has raised concerns about people hacking into home networks or using armies of bots to disrupt communications. But with the Industrial IoT, the stakes are significantly higher—and the effects can last much longer. Security tops the list of concerns as more industrial equipment is connected to the Internet, according to numerous industry insiders. That hasn't stopped ... » read more

System Bits: March 21


Sensors vulnerable to sonic cyber attacks According to University of Michigan researchers, sound waves could be used to hack into critical sensors in a wide range of technologies including smartphones, automobiles, medical devices and IoT devices. New research calls into question the longstanding computer science tenet that software can automatically trust hardware sensors, which feed auton... » read more

Power, Performance And Electronic Surveillance


The disclosure that smart TVs can be used as for surveillance purposes is hardly a revelation. Makers of these devices have been advertising gesture recognition features for several years. Far from being evil, TV makers were responding to market research that showed voice inputs were a good way to boost sales in a saturated digital TV market. They added cameras so buyers could wave their han... » read more

How To Implement A Secure IoT System On ARMv8-M


Attacks on IoT devices are guaranteed - they will happen! Therefore, system security needs to be easy and fast to implement. With ARM's newest embedded processors - the ARM Cortex-M23 and Cortex-M33 with TrustZone for ARMv8-M - developers can take advantage of hardware-enforced security. Now, system designers have the challenge to extend security throughout the whole system. Join this techni... » read more

Testing For Security


Ever since the IoT became a household name, people have been strategizing about ways to utilize non-secure devices to mount an attack. The first instances of using electricity to overload a device's circuits, thereby neutralizing existing security features, came to light in some of the earliest car hacking incidents. These are basically side-channel attacks using what amounts to an electroni... » read more

Quality Issues Widen


As the amount of semiconductor content in cars, medical and industrial applications increases, so does the concern about how long these devices will function properly—and what exactly that means. Quality is frequently a fuzzy concept. In mobile phones, problems have ranged from bad antenna placement, which resulted in batteries draining too quickly, to features that take too long to load. ... » read more

Internet Security? Not Even Close


This week's outage at Amazon Web Services is yet another reminder that Internet security is still not quite there. Amazon isn't a second-tier cloud services provider. It's one of the biggest cloud companies on the planet. If Amazon can't get it right, it's hard to imagine anyone can. The company's Simple Storage Service, aka S3, was the target, and it took about five hours before this online... » read more

The Evolving Ransomware Threat


Ransomware has become a serious threat in recent years, with thousands of new variants surfacing in 2016 alone. This is really bad news for system administrators, as computers infected with ransomware are typically locked down until cyber criminals are given a hefty sum to unlock encrypted files. Disturbingly, IDG recently confirmed the existence of a new file-encrypting ransomware program f... » read more

Side-Channel Attacks


There are many techniques available for hackers to gain access to a system and obtain secret keys or other proprietary information– from invasive methods, such as microprobing, to noninvasive methods, such as cryptoanalysis. However, one of the easiest and most effective ways to extract the contents of a chip is through a side-channel attack using power analysis. To read more, click here. » read more

Dealing With Unintended Behavior


Functional verification was already tough enough, but having to identify behaviors that were never defined or intended opens up the search space beyond what existing tools are capable of handling. However, while you may not be able to eliminate unintended behaviors, a design team is not helpless. There are several steps that can be taken to reduce the likelihood of these problems getting int... » read more

← Older posts