Washington Sets IoT Cybersecurity Standards


On December 4th, 2020, the “IoT Cybersecurity Improvement Act of 2020” became law. The bipartisan legislation sets a minimum security standard for IoT devices that the US government procures. In an increasingly rare act of bipartisanship, the bill was “passed by unanimous consent” in both the House of Representatives and the Senate, demonstrating the importance of IoT security. The l... » read more

Safeguarding Automotive Electronics


Modern automobiles can have up to 100 Electronic Control Units (ECUs) depending on their class, make, and model, with the number of ECUs rising even higher in the case of electric vehicles. An ECU is an embedded system in the car’s electronics. They are used to control all the vehicle's functions, including engine, powertrain, transmission, brakes, suspension, dashboard, entertainment system ... » read more

Achieving Security Goals With A Hardware Root Of Trust


In an environment of growing threats, meeting a fundamental set of security goals is imperative for safeguarding devices and data from attack. The most robust means of meeting these goals is a root of trust anchored in hardware. In Microsoft’s “The Seven Properties of Highly Secured Devices” white paper, property #1 is implementation of a hardware root of trust. As Microsoft explains: ... » read more

Protecting Chiplet Architectures With Hardware Security


Chiplets are gaining significant traction as they provide compelling benefits for advancing semiconductor performance, costs, and time to market. With Moore’s Law slowing, building more powerful chips translates into building bigger chips. But with chip dimensions pushing up against reticle limits, growing the size of chips is increasingly impractical. Chiplets offer a new path forward by dis... » read more

Choosing The Right Hardware Root Of Trust


A Root of Trust is broadly defined as the security foundation for a semiconductor or electronic system. Any secure function performed by the device or system relies in whole or in part on that Root of Trust. The Root of Trust typically handles chip and device identities, cryptographic functions, stores and manages cryptographic keys, and handles one or more secure processes that provides the fo... » read more

Security Implications Of Quantum Computing


The US Government just stepped up the push for quantum computing with an award of $625 million in funding to create five quantum information research centers. Industry and academic institutions will contribute $300 million toward this effort with the remainder drawn from the $1.2 billion earmarked in the 2018 law: the National Quantum Initiative Act. The race to quantum computing is a global on... » read more

Combating Counterfeit Chips


The harsh reality is that today, the authenticity of chips is often impossible to guarantee. The counterfeit chip market is sizeable and growing with a worldwide value estimated at $75B in 2019. Those counterfeits are believed to have been integrated into more than $169B of electronic devices. Recent confirmed incidents of counterfeit parts found in electronic systems include defibrillators, ai... » read more

The Evolution Of Ethernet To 800G And MACsec Encryption


Ethernet is a frame-based data communication technology that employs variable-sized frames to carry a data payload. This contrasts with long-haul Optical Transport Networks (OTN) that use fixed-sized frames. The size of Ethernet frames ranges from a minimum of 60 bytes up to 1500 bytes, and in case of jumbo frames, up to 9K bytes. A frame is a Layer 2 data container with the physical addresses ... » read more

Scaling Anti-Tamper Protection To Meet Escalating Threats


Anti-tamper tends to be one of those catchall phrases encompassing any countermeasure on a security chip. A more precise definition would be that anti-tamper protection is any collection of countermeasures that serves to thwart an adversary’s attempt to monitor or affect the correct operation of a chip or a security core within a chip. Given that, it can be useful to think about a hierarchy o... » read more

Securing Data In Motion With MACsec


For end-to-end security of data, it must be secured both when “at rest” (processed or stored in a connected device) and when it is “in motion” (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides that foundation upon which all data and device security is built. For example, the security of applications builds on an uncompromis... » read more

← Older posts Newer posts →