Trusted Electronics: Current And Future Developments


In today’s world, we encounter electronics increasingly as complex hardware/software systems, such as those in vehicles, machines, and communication devices. These systems are characterized by dramatic increases in functionality in areas like environment sensing, stages of autonomy, and the installation of future updates. Developing and manufacturing such electronic systems today requires glo... » read more

Silicon Root Of Trust IP And The Automotive Chain Of Trust


Cybersecurity attacks in the automotive industry have increased in magnitude, frequency and sophistication in recent years. According to IDC, there have been more than 900 publicly reported automotive security incidents since 2010, and this number is growing year over year. New attack vectors are emerging all the time. For example, attacks on the EV charging infrastructure reached 4% of total i... » read more

Achieving Security Goals With A Hardware Root Of Trust


In an environment of growing threats, meeting a fundamental set of security goals is imperative for safeguarding devices and data from attack. The most robust means of meeting these goals is a root of trust anchored in hardware. In Microsoft’s “The Seven Properties of Highly Secured Devices” white paper, property #1 is implementation of a hardware root of trust. As Microsoft explains: ... » read more

IoT Security: Technology Is Only One Part Of The Equation


Survey after survey on the adoption of the IoT punctuates that security and data privacy continue to be the top concerns with any new implementation. It used to be that security was all about protecting data (business, personal ID, etc.), but as more devices are connected to the IoT, security concerns reach far beyond just the value inherent in the data. According to Gartner, nearly 5.5 ... » read more

IoT Security Risks Grow


Semiconductor Engineering sat down to discuss security issues with Asaf Shen, vice president of marketing for security IP in ARM's Systems & Software Group; Timothy Dry, principal staff marketing manager for the Industrial IoT segment at GlobalFoundries; Chowdary Yanamadala, senior vice president of business development at ChaoLogix; and Eric Sivertson, CEO of Quantum Trace. What follows ar... » read more

How To Build Security Into Your IoT Wearable Device


In today's connected world, IoT wearable devices should be built from the ground up to include basic, fundamental security capabilities. This whitepaper explains the key security technologies critical for creating a secure IoT embedded device. Topics include code and boot-time authentication, establishing a chain of trust, process separation and space partitioning, using a safety-certified oper... » read more

One-Time-Programmable Memories For IoT Security


Security in the IoT space is an issue of major concern. Hackers are attacking IoT devices across all layers of the infrastructure, from the application layer down to protocol, to the physical and deep into the IoT devices. I intend to focus on vulnerability prevention for IoT devices at the lowest level: memory structure and key storage. I conclude with indicating highly important features a... » read more