Hardware-Efficient Approach To Defend Against Fault Attacks


A technical paper titled "Fault Attacks on Access Control in Processors: Threat, Formal Analysis and Microarchitectural Mitigation" was published by researchers at University of Kaiserslautern-Landau. Abstract: "Process isolation is a key component of the security architecture in any hardware/software system. However, even when implemented correctly and comprehensively at the software (SW) le... » read more

Building Access Control With Free Topology


For facilities managers of large buildings and campuses, security and access control are huge challenges. Authorized persons come and go so privileges must be granted and revoked; different employees, students and visitors may all have different levels of privilege/access; the access cards themselves must be authenticated; and the list goes on. This is in the face of ever-escalating security th... » read more