What Can You Trust In The IoT?


Most of us on the bleeding edge of technology are aware that the Internet of Things/Everything and the Cloud of Things (IoT/E), (CoT), are slowly becoming less fuzzy. No one knows exactly what the model ultimately will look like, but it is becoming clearer and clearer that it won’t be radically different than the Internet we have today—just more objects, more interconnects, more autonomy, a... » read more

Defending Against Reverse Engineering


Most of us are familiar with the term “reverse engineering.” We generally know that it is used to extract data or designs from chips, but exactly how is pretty much a mystery. Today, chip security has very broad implications. The landscape of tomorrow will be cluttered with devices that are microprocessor-controlled, including some that are autonomous. Numbers vary, but the current esti... » read more

The Week In Review: Design


Tools Sonics upgraded its on-chip network, improving support for memory subsystems as well as performance with guaranteed bandwidth allocation across multiple SOC flows. The company said these upgrades add support for the latest DDR4 and LPDDR4 memories, for the multi-threading capabilities of the Open Core Protocol interface, and while adding non-blocking concurrency technologies. Mentor G... » read more

Programmable Risk Factors


The semiconductor industry is starting to come around to the realization that security begins at the block level. Intellectual property (IP) is being seen with IP blocks that can be woven into the general-purpose system-on-chip (SoC) hardware layers to secure I/O, data, keys, and various other sensitive or critical information. But modifying hardware designs in response to the demands placed... » read more

M2M And The Internet Of Things


Securing the Internet of Things/Everything (IoT/E) is a bit like herding cats. There are so many elements that will make up the IoT/E, it may seem an insurmountable objective to corral them all into a single stable. By some accounts, we’re on our way toward 200 billion Internet-connected machines by 2020, according to IDC. Soon we will live in a world where automated machine-to-machine (M2M) ... » read more

Mobile Device Security


As the functionality of mobile devices has increased, so have the threats. These devices make attractive targets, given the sensitivity of user and corporate data they process and store, their emerging use for viewing protected content and conducting sensitive banking and payment transactions. Until recently, hardware and software based defenses for mobile platforms lagged behind those found in... » read more

Security Matters In The Face Of The Internet Of Things


There’s much talk about the huge growth potential of the Internet of Things, with estimates citing 30 billion to 50 billion connected devices by 2020. One billion smartphones were sold in the last five years; an impressive number, no doubt. But did you know we also added 244 million smart grid devices, over 5 billion consumer electronics devices, and over 500 million connected appliances i... » read more

Hiding The Electronic Crumbs


Imagine an old Western movie where the posse tracks the outlaws by following footsteps on a dirt trail or looking for broken branches. Now fast forward to the present, where the trail is electronic, the posse is comprised of bad guys, and the loot is frequently encrypted. As any security expert will concede, every security system can be compromised, every chip can be reverse engineered and h... » read more

When Smart Cards Make Sense…


Smart cards, also referred to as hardware tokens, offer one of the highest levels of security within the framework of securable objects. This is for one obvious reason – it is disconnected from the interconnected world. Unlike wireless or hard-wired objects that require online connectivity for functionality, smart cards must be in physical, or near physical contact (contactless that requir... » read more

DPA Countermeasures


Smartphones, tablets and other mobile devices con- tain cryptographic keys that protect payments, VPN/network connections and on-device flash memory. Although some smartphones and other devices contain countermeasures, many do not and can be easily compromised. Even a simple radio can tune into the radio frequency emissions from mobile devices and gather side channel information. In some cases,... » read more

← Older posts Newer posts →