Author's Latest Posts


Detecting And Preventing Automotive Hardware Security Vulnerabilities


In this new whitepaper, you will learn: How to detect and prevent hardware security vulnerabilities in automotive applications with Tortuga Logic’s Radix See how using Radix, as part of your Automotive Security Development Lifecycle, automates and enables a security signoff methodology Click here to read white paper. » read more

Securing SOCs With Esecure HRoT From Silex Insight And Tortuga Logic’s Radix-S


In this new whitepaper, you will learn: How Hardware Roots of Trust (HRoTs) are being used to protect systems with a security foundation The use  of Threat modeling to effectively to verify the eSecure HRoT from Silex Insight in surrounding systems A five-step hardware security validation process that leverages hardware CWEs and Tortuga Logic’s Radix-S to detect and prevent securi... » read more

Measurable Hardware Security With Mitre CWEs


In this new white paper, you will learn how MITRE’s new hardware of Common Weakness Enumerations (CWE) can assist the development team in threat modeling and security validation. Here is a 5-steps CWE validation process to significantly save time, resources, and money on FPGA, ASIC, and SoC design. Click here to continue reading. » read more

Detect And Prevent Security Vulnerabilities In Your Hardware Root Of Trust


Hardware is at the root of the trust chain. Software runs on chipsets in every system meaning that if the hardware itself is not secure the most advanced software-level defenses can still be circumvented. However, it is important to emphasize that analyzing hardware in isolation also does not guarantee system-level security. Composing different parts of a system together can result in vulnerabi... » read more