The Evolution Of Side-Channel Attacks


A side-channel attack can perhaps best be defined as any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms. Put simply, all physical electronic systems routinely leak information about their internal process of computing via their power consumption or electromagnetic emanations. This mean... » read more

IoT Security Risks Grow


Semiconductor Engineering sat down to discuss security issues with Asaf Shen, vice president of marketing for security IP in [getentity id="22186" e_name="ARM's"] Systems & Software Group; Timothy Dry, principal staff marketing manager for the Industrial IoT segment at [getentity id="22819" comment="GlobalFoundries"]; Chowdary Yanamadala, senior vice president of business development at Cha... » read more

Biz Talk: ASICs


eSilicon CEO [getperson id="11145" comment="Jack Harding"] talks about the future of scaling, advanced packaging, the next big things—automotive, deep learning and virtual reality—and the need for security. [youtube vid=leO8gABABqk]   Related Stories Executive Insight: Jack Harding (Aug 2016) eSilicon’s CEO looks at industry consolidation, competition, China’s impact, an... » read more

Data Leakage And The IIoT


The Internet of Things has raised concerns about people hacking into home networks or using armies of bots to disrupt communications. But with the Industrial IoT, the stakes are significantly higher—and the effects can last much longer. Security tops the list of concerns as more industrial equipment is connected to the Internet, according to numerous industry insiders. That hasn't stopped ... » read more

System Bits: March 21


Sensors vulnerable to sonic cyber attacks According to University of Michigan researchers, sound waves could be used to hack into critical sensors in a wide range of technologies including smartphones, automobiles, medical devices and IoT devices. New research calls into question the longstanding computer science tenet that software can automatically trust hardware sensors, which feed auton... » read more

Power, Performance And Electronic Surveillance


The disclosure that smart TVs can be used as for surveillance purposes is hardly a revelation. Makers of these devices have been advertising gesture recognition features for several years. Far from being evil, TV makers were responding to market research that showed voice inputs were a good way to boost sales in a saturated digital TV market. They added cameras so buyers could wave their han... » read more

How To Implement A Secure IoT System On ARMv8-M


Attacks on IoT devices are guaranteed - they will happen! Therefore, system security needs to be easy and fast to implement. With ARM's newest embedded processors - the ARM Cortex-M23 and Cortex-M33 with TrustZone for ARMv8-M - developers can take advantage of hardware-enforced security. Now, system designers have the challenge to extend security throughout the whole system. Join this techni... » read more

Testing For Security


Ever since the IoT became a household name, people have been strategizing about ways to utilize non-secure devices to mount an attack. The first instances of using electricity to overload a device's circuits, thereby neutralizing existing security features, came to light in some of the earliest car hacking incidents. These are basically side-channel attacks using what amounts to an electroni... » read more

Quality Issues Widen


As the amount of semiconductor content in cars, medical and industrial applications increases, so does the concern about how long these devices will function properly—and what exactly that means. Quality is frequently a fuzzy concept. In mobile phones, problems have ranged from bad antenna placement, which resulted in batteries draining too quickly, to features that take too long to load. ... » read more

Internet Security? Not Even Close


This week's outage at Amazon Web Services is yet another reminder that Internet security is still not quite there. Amazon isn't a second-tier cloud services provider. It's one of the biggest cloud companies on the planet. If Amazon can't get it right, it's hard to imagine anyone can. The company's Simple Storage Service, aka S3, was the target, and it took about five hours before this online... » read more

← Older posts Newer posts →