Special Report
Why Every Chip Can Be Hacked With This Tool
A look at the dark side of focused ion beam technology.
Top Stories
What Can You Trust In The IoT?
Trusted platforms are emerging as a significant element of the Internet of Things for keeping autonomous objects secure.
Designing For Security
Adding security features into SoCs can affect power, performance and the overall NRE costs in an SoC.
Defending Against Reverse Engineering“
Even the most benign devices can provide a security risk. What happens when you remodel a house and don’t deactivate a “smart” device?
White Hat Hacking
Reverse engineering is a process that offers all the elements of the good, the bad, and the ugly. However, for a company on the edge of technology, not being on the edge of understanding it can be fatal.
Blogs
Editor In Chief Ed Sperling predicts the Internet of Things will roll out according to application segment first, with lots of speculation about what’s next in Infrastructure, Then Integration.
Technology Editor Ernest Worthman contends you’re never quite as safe as you imagined in Things That Scare Me.
Executive Editor Ann Mutschler observes there are a number of security features for designers to leverage, but questions whether they strong enough to hold off attacks, in Chip Security Features Abound…But Are They Enough?
Rambus’ Frank Ferro observes that a better title for the IoT might be the Infrastructure of Things in Caught In Between.
NXP’s Martijn van der Linden provides a glimpse into the next revolution in automobiles in Connected Car Of The Future Stella Gets London Debut.
Sponsor Whitepapers
Addressing Test Cost Challenges In LPCT Designs
Especially in automotive and micro controllers, packages sizes are getting smaller and the number of pins being bonded are fewer.
Internet Of Things Design Considerations For Embedded Connected Devices
A look at the complexities and emerging standards embedded system developers need to consider for IoT devices.