IoT Security Risks Grow


Semiconductor Engineering sat down to discuss security issues with Asaf Shen, vice president of marketing for security IP in ARM's Systems & Software Group; Timothy Dry, principal staff marketing manager for the Industrial IoT segment at GlobalFoundries; Chowdary Yanamadala, senior vice president of business development at ChaoLogix; and Eric Sivertson, CEO of Quantum Trace. What follows ar... » read more

What’s Next For IoT Security?


By Ed Sperling & Jeff Dorsch With security, the little things can cause as much of a problem as the big things. As shown in the recent distributed denial of service attack (DDoS) on Dyn, which created waves of attacks using Mirai malware, connected devices of all sizes can be amassed into an army of bots that can bring even giants like Amazon and Netflix to a dead stop. This attack was ... » read more

Side-Channel Attacks Make Devices Vulnerable


As the world begins to take security more seriously, it becomes evident that a device is only as secure as its weakest component. No device can be made secure by protecting against a single kind of attack. Hypervisors add a layer of separation between tasks making sure that one task cannot steal secrets from another. Protection of the JTAG port is necessary to prevent access underneath the h... » read more

System Bits: Aug. 23


Monitor side-channel signals for IoT device security Thanks to a Defense Advanced Research Projects Agency (DARPA) grant, Georgia Tech researchers are working to develop a new technique for wirelessly monitoring IoT devices for malicious software – without affecting the operation of the ubiquitous, and low-power equipment. The team said the technique will rely on receiving and analyzing s... » read more

Grappling With IoT Security


By Ed Sperling & Ernest Worthman As the IoT begins to take shape, the security implications of connecting devices and systems to the Internet and what needs to be done to secure them are coming into focus, as well. There is growing consensus across the semiconductor industry that many potential security holes remain, with new ones surfacing all the time. But there also is widespread r... » read more

Way Too Much Data


Moving to the next process nodes will produce volumes more data, forcing chipmakers to adopt more expensive hardware to process and utilize that data, more end-to-end methodologies, as well as using tools and approaches that in the past were frequently considered optional. Moreover, where that data needs to be dealt with is changing as companies adopt a "shift left" approach to developing so... » read more

Simulating For Security


When we think of the field of cryptography, we often tend to think of math-intensive software encryption schemes, algorithms trying to prevent sensitive data from getting into the wrong hands, and hackers poring over code searching for potential loopholes in data sent over secure channels. However, we must also consider the fact that data has to physically make its way through transistors, p... » read more

Executive Insight: Paul Kocher


Paul Kocher, president and chief scientist of Rambus' Cryptography Research Division, sat down with Semiconductor Engineering to talk about the state of security today and how it will be affected as more devices are connected. What follows are excerpts of that conversation. SE: The number of vulnerabilities is increasing. Are we making progress? Kocher: If your metric for progress is the... » read more

Security In 2.5D


The long-anticipated move to 2.5D and fan-outs is raising some familiar questions about security. Will multiple chips combined in an advanced package be as secure as SoCs where everything is integrated on the same die? The answer isn't a simple yes or no. Put in perspective, all chips are vulnerable to [getkc id="253" kc_name="side channel attacks"], hacking of memory—a risk that increases... » read more

Rising Threats From Differential Power Analysis


Differential power analysis (DPA) has been a threat vector on the chip landscape for a number of years. It was discovered around the mid 1990s by the teams at [getentity id="22671" e_name="Rambus"]’ Cryptography Research Division, and turned out to be a very effective tool for compromising the ubiquitous SIM card environment. “The most traditional market for DPA has been with smart cards... » read more

← Older posts