Building A Defense In Depth Against Cyberattacks


As the number and type of cyberattacks, from the “simple and cheap” to the “expensive and sophisticated,” continues to grow at a dramatic pace, protection of chips and devices must employ a defense in depth strategy. In this way, if an attacker successfully bypasses a mechanism of protection, they’ll face another layer of defense, rather than a clear path to the assets they seek to ex... » read more

Security Starts With A Threat Assessment


Developing the security architecture for an electronic device begins with building a threat model wherein we ask these questions: What is the operational environment in which the device needs to function? What type of attacks can be identified? What level of access does a potential attacker have to the device? What possible attack paths can an attacker exploit? What resources (... » read more

Architecting Hardware Protection For Data At Rest And In Motion


Planning the security architecture for any device begins with the threat model. The threat model describes the types of attacks that the device or application may face and needs to be protected against. It is based on what attackers can do, what level of control they have over the product (i.e., remote or direct access), and how much effort and money they are willing and able to spend on an att... » read more

Implementing Secure Boot With A Root Of Trust


A boot sequence describes the initial set of operations performed by a device at the start of the boot process. During this stage, available resources reside in some form of local, nonvolatile storage that is readily accessible by the device. The entity initiating the startup sequence is known as a boot loader (or bootstrap loader). The boot loader enables forward progression throughout the ... » read more

Navigating The Seas Of FIPS 140-2 CMVP With Certified Root Of Trust And TRNG IP


No captain worth his salt would set sail without an experienced navigator at his side. Likewise, when navigating the FIPS 140-2 CMVP process, it’s extremely valuable to have a partner that has already successfully made the journey. More specifically, working with a partner that offers CMVP-certified IP can streamline the process and increase the success of achieving CMVP certification of chip... » read more

Stepping Up To Greater Security


The stakes for security grow with each passing day. The value of our data, our devices, and our network infrastructure continually increases as does our dependence on these vital resources. Reports appear weekly, and often daily, that describe security vulnerabilities in deployments. There is a steady drumbeat of successful attacks on systems that were assumed to be protecting infrastructure, i... » read more

Securing The SoC Life Cycle


Over the course of its life, an SoC (system on chip) goes through multiple life cycle states which are different in character and have varying and sometimes contradictory security requirements. In each state, the SoC may be under different ownership in the supply chain. Also, as it transitions through different manufacturing phases, it is subject to a different set of possible attacks, which sh... » read more

Securing Server Systems And Data At The Hardware Level


Across the global internet, there’s a growing need to secure data, not only coursing over the network, but within the servers in data centers and deployed at the edge. Interconnect technologies such as Compute Express Link (CXL) will enable future servers to be disaggregated into composable resources that can be finely matched to the requirements of varied workloads and support virtualized co... » read more

Securing ADAS At The Chip Level


The advent of ADAS, Advanced Driver Assistance Systems, is making a dramatic impact on new vehicles. It provides many helpful functions such as automotive night vision, forward collision warnings, collision avoidance, and lane departure warnings. In order to operate, ADAS requires the computerization of most of the functions of the vehicle. This results in from 50 to over 100 electronic control... » read more

Securing AI/ML With A Hardware Root Of Trust


AI/ML (Artificial Intelligence/Machine Learning) is now pervasive across all industries. It contributes to rationalizing and harnessing the enormous amount of information made available by the current massive wave of digitization. Digitization is transforming how business is run and how value is produced using digital technologies. Data, the raw material of AI/ML and deep learning algorithms, i... » read more

← Older posts Newer posts →