IC Security Threat Grows As More Devices Are Connected


Designing for security is beginning to gain traction across a wider swath of chips and systems as more of them are connected to the Internet and to each other, sometimes in safety- and mission-critical markets where the impact of a cyber attack can be devastating. But it's also becoming more difficult to design security into these systems. Unlike in the past, connectivity is now considered e... » read more

What Makes A Chip Tamper-Proof?


The cyber world is the next major battlefield, and attackers are busily looking for ways to disrupt critical infrastructure. There is widespread proof this is happening. “Twenty-six percent of the U.S. power grid was found to be hosting Trojans," said Haydn Povey, IAR Systems' general manager of embedded security solutions. "In a cyber-warfare situation, that's the first thing that would b... » read more

Hardware Security For AI Accelerators


Dedicated accelerator hardware for artificial intelligence and machine learning (AI/ML) algorithms are increasingly prevalent in data centers and endpoint devices. These accelerators handle valuable data and models, and face a growing threat landscape putting AI/ML assets at risk. Using fundamental cryptographic security techniques performed by a hardware root of trust can safeguard these as... » read more

Detect And Prevent Security Vulnerabilities In Your Hardware Root Of Trust


Hardware is at the root of the trust chain. Software runs on chipsets in every system meaning that if the hardware itself is not secure the most advanced software-level defenses can still be circumvented. However, it is important to emphasize that analyzing hardware in isolation also does not guarantee system-level security. Composing different parts of a system together can result in vulnerabi... » read more

Differential Power Analysis


Authors Paul Kocher, Joshua Jaffe, and Benjamin Jun Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption measurements to and secret keys from tamper resistant d... » read more

Armv8.5-A Memory Tagging Extension


The Internet worm of 1988 took offline one tenth of the fledgling network, and severely slowed down the remainder [1]. Over 30 years later, two of the most important classes of security vulnerability in code written in C-like languages are still violations of memory safety. According to a 2019 BlueHat presentation, 70% of all security issues addressed in Microsoft products are caused by violati... » read more

Configure, Confirm, Ship: Build Secure Processor-Based Systems with Faster Time-to-Market


Security is a first-order design requirement for processor-based systems. Processor designers implement security functionality directly into the hardware itself to protect the system at its most fundamental layer. System integrators that use processor IP such as Synopsys’ DesignWare ARC processors must ensure that they configure and manage the protection and security features correctly, and t... » read more

Chip Security Impacts Power, Performance


We know that hackers are getting more sophisticated all the time to the point that it may already be possible to gain access to an automobile without touching it. According to this Financial Times article, with new cars containing an increasing number of connected applications – everything from music streaming services and Bluetooth to email readers and likely even GPS systems – it leaves t... » read more

Securing Chip Data More Critical Than Ever


Everywhere you turn in the mainstream media, it is easy to find stories of security breaches – from Target not adequately protecting customer data to cars allegedly being hacked to hackers themselves showing how easy it is to do what they do. As technology increases in complexity, so do the hackers themselves. This is a problem. As such, chipmakers are increasingly becoming aware of vulner... » read more

Newer posts →