EV Charging Cybersecurity Challenges (Sandia National Labs)


A technical paper titled "Review of Electric Vehicle Charger Cybersecurity Vulnerabilities, Potential Impacts, and Defenses" was published by researchers at Sandia National Laboratories. Abstract: "Worldwide growth in electric vehicle use is prompting new installations of private and public electric vehicle supply equipment (EVSE). EVSE devices support the electrification of the transportat... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive And Mobility Two major auto OEMs revealed new electric vehicle models this week. The Audi Q8 e-tron has 40 driver assistance systems including five radar sensors, five cameras, and 12 ultrasonic sensors, and comes with either an 89 net kilowatt-hour battery or a 106 net kilowatt-hour battery. It arrives in the U.S. in April 2023. The Volvo EX90 contains both lidar and 5G connectivit... » read more

Semiconductor Manufacturing: Tradeoffs Between Performance, Energy Consumption & Cybersecurity Controls


A new research paper titled "Simulating Energy and Security Interactions in Semiconductor Manufacturing: Insights from the Intel Minifab Model" was published by researchers at Idaho National Laboratory, University of Texas at Austin, University of Texas at San Antonio and George Mason University. Abstract: "Semiconductor manufacturing is a highly complex. Fabrication plants must deal with r... » read more

Side-Channel Secure Translation Lookaside Buffer Architecture


A new technical paper titled "Risky Translations: Securing TLBs against Timing Side Channels" was posted by researchers at Ruhr University Bochum (Germany) and Cyber-Physical Systems of the German Research Center for Artificial Intelligence (DFKI). Abstract: "Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful attack vector that can be utilized to... » read more

Hardware Implementation Of A Random Gumber Generator On A FPGA


A new research paper titled "FPGA Random Number Generator" was published by a researcher at Johns Hopkins University. According to the paper's abstract: "This paper offers a proof-of-concept for creating a verilog-based hardware design that utilizes random measurement and scrambling algorithms to generate 32-bit random synchronously with a single clock cycle on a field-programmable-gate-arr... » read more

Security Highlight: Honda Rolling-PWN Attack


The attack known as Rolling-PWN (CVE-2021-46145) [1] is the latest of a recent series of security issues affecting the car’s immobilizers and RKEs (Remote Keyless Entry, also known as the keyfob or remote control). Over the past years, we have seen how security researchers identified attacks that could open and even start cars from vendors like Tesla [2], Hyundai-Kia [3], VAG (Volkswagen, ... » read more

Cybersecurity Is A Journey


Hardware Is the Foundation of Your Security Posture Due to the inability to ‘patch’ silicon, failure to identify and remediate hardware vulnerabilities early comes with catastrophic consequences. However, most of the focus and investments in cybersecurity have historically been on device software and its administrators, not on securing the underlying hardware. Hardware Vulnerabilitie... » read more

Five Things You Should Know To Avoid The Most Common Security Errors


Since 2001, Riscure has been helping chip vendors and device manufacturers improve the security of their products. Over the years, the security scenario has changed a lot. The attacker profile evolved from individuals motivated by curiosity, with very limited resources and attack potential, to well-funded and organized adversaries with dark motivations and the capacity to execute very sophistic... » read more

Reduce RowHammer Vulnerability By Reducing Wordline Voltage


Researchers from ETH Zurich present a new technical paper titled "Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices." Abstract (Partial) "This is the first work to experimentally demonstrate on 272 real DRAM chips that lowering VPP reduces a DRAM chip's RowHammer vulnerability. We show that lowering VPP 1) increases the number of activat... » read more

Safeguarding A Digital Transformation Across The Entire Product Lifecycle


In 2020, the SolarWinds breach highlighted the emergence of software supply chain attacks as a very real security threat that impacted many high-profile companies. (The software supply chain includes third-party and open-source components used in a software product.) Then in late 2021, not to be outdone, the massive scope of the Log4j vulnerability emerged, impacting millions of consumer produc... » read more

← Older posts Newer posts →