Silicon Root Of Trust IP And The Automotive Chain Of Trust


Cybersecurity attacks in the automotive industry have increased in magnitude, frequency and sophistication in recent years. According to IDC, there have been more than 900 publicly reported automotive security incidents since 2010, and this number is growing year over year. New attack vectors are emerging all the time. For example, attacks on the EV charging infrastructure reached 4% of total i... » read more

Power/Performance Costs Of Securing Systems


For much of the chip industry, concerns about security are relatively new, but the requirement for protecting semiconductor devices is becoming pervasive. Unfortunately for many industries, that lesson has been learned the hard way. Security breaches have led to the loss of sensitive data, ransomware attacks that lock up data, theft of intellectual property or financial resources, and loss o... » read more

Hardware Security: Eliminating/Reducing A Blind Spot of Side Channels (CISPA Helmholtz Center for Information Security)


A technical paper titled "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels" was published by researchers at CISPA Helmholtz Center for Information Security. Abstract: "In the last years, there has been a rapid increase in microarchitectural attacks, exploiting side effects of various parts of the CPU. Most of them have in common that they rely ... » read more

Minimizing Cybersecurity Risks With ISO/SAE 21434


To mitigate the cybersecurity risk, industry stakeholders have developed the new ISO/SAE 21434 Road Vehicles—Cybersecurity Engineering standard. Industry leaders are quickly adopting ISO/SAE 21434 as the leading approach for cybersecurity. Suppliers such as Renesas announced1 their commitment to ISO/SAE 21434 in October 2021. Recently, NXP2 and Texas Instruments3 both certified their Au... » read more

Role Of IoT Software Expanding


IoT software is becoming much more sophisticated and complex as vendors seek to optimize it for specific applications, and far more essential for vendors looking to deliver devices on-time and on-budget across multiple market segments. That complexity varies widely across the IoT. For example, the sensor monitoring for a simple sprinkler system is far different than the preventive maintenanc... » read more

Overview of Machine Learning Algorithms Used In Hardware Security (TU Delft)


A new technical paper titled "A Survey on Machine Learning in Hardware Security" was published by researchers at TU Delft. Abstract "Hardware security is currently a very influential domain, where each year countless works are published concerning attacks against hardware and countermeasures. A significant number of them use machine learning, which is proven to be very effective in ... » read more

Threat Modeling, Decoded — Charting The Security Journey


Connected systems are part of the modern world. There is virtually no aspect of life that is not available online, from shopping and booking tickets to dating, banking, and attending medical appointments. And these trends show no sign of stopping. On the contrary, many services are moving to digital-first or digital-only models, and every day, new products— from toasters to autonomous vehicle... » read more

Hardware Based Monitoring For Zero Trust Environments


A technical paper titled "Towards Hardware-Based Application Fingerprinting with Microarchitectural Signals for Zero Trust Environments" was published by the Air Force Institute of Technology. Abstract "The interactions between software and hardware are increasingly important to computer system security. This research collects sequences of microprocessor control signals to develop machine ... » read more

Review of Methods to Design Secure Memristor Computing Systems


A technical paper titled "Review of security techniques for memristor computing systems" was published by researchers at Israel Institute of Technology, Friedrich Schiller University Jena (Germany), and Leibniz Institute of Photonic Technology (IPHT). Abstract "Neural network (NN) algorithms have become the dominant tool in visual object recognition, natural language processing, and robotic... » read more

Best Practices For Cybersecurity-Aware SoC Development With ISO 21434


The growth of electronics in cars is exposing a new vector for cyberattacks on owners and automotive companies’ reputations. The potential human cost of an attack on the car’s electronics is driving urgency in the adoption of cybersecurity-aware practices, from OEMs and Tier 1s to every component supplier in the automotive industry. The standard “ISO/SAE 21434:2021 Road vehicles — Cyber... » read more

← Older posts Newer posts →