Differential Power Analysis


Authors Paul Kocher, Joshua Jaffe, and Benjamin Jun Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption measurements to and secret keys from tamper resistant d... » read more

Armv8.5-A Memory Tagging Extension


The Internet worm of 1988 took offline one tenth of the fledgling network, and severely slowed down the remainder [1]. Over 30 years later, two of the most important classes of security vulnerability in code written in C-like languages are still violations of memory safety. According to a 2019 BlueHat presentation, 70% of all security issues addressed in Microsoft products are caused by violati... » read more

Configure, Confirm, Ship: Build Secure Processor-Based Systems with Faster Time-to-Market


Security is a first-order design requirement for processor-based systems. Processor designers implement security functionality directly into the hardware itself to protect the system at its most fundamental layer. System integrators that use processor IP such as Synopsys’ DesignWare ARC processors must ensure that they configure and manage the protection and security features correctly, and t... » read more

Chip Security Impacts Power, Performance


We know that hackers are getting more sophisticated all the time to the point that it may already be possible to gain access to an automobile without touching it. According to this Financial Times article, with new cars containing an increasing number of connected applications – everything from music streaming services and Bluetooth to email readers and likely even GPS systems – it leaves t... » read more

Securing Chip Data More Critical Than Ever


Everywhere you turn in the mainstream media, it is easy to find stories of security breaches – from Target not adequately protecting customer data to cars allegedly being hacked to hackers themselves showing how easy it is to do what they do. As technology increases in complexity, so do the hackers themselves. This is a problem. As such, chipmakers are increasingly becoming aware of vulner... » read more