SoC integrators know that a software-only chip security plan leaves devices open to attack. All that a hacker needs to do is find a way to replace key parts of the bootloader or the low-level firmware to compromise other software in the system used to support secure access.
The most simple attacks come remotely over a network, and these can be patched with software upgrades. However, we see ...
» read more