中文 English

Power/Performance Bits: June 1


Stronger PUFs Researchers from Ohio State University and Potomac Research propose a new version of physical unclonable functions, or PUFs, that could be used to create secure ID cards, to track goods in supply chains, and as part of authentication applications. "There's a wealth of information in even the smallest differences found on computers chips that we can exploit to create PUFs," sai... » read more

All-in-One Vs. Point Tools For Security


Security remains an urgent concern for builders of any system that might tempt attackers, but designers find themselves faced with a bewildering array of security options. Some of those are point solutions for specific pieces of the security puzzle. Others bill themselves as all-in-one, where the whole puzzle filled in. Which approach is best depends on the resources you have available and y... » read more

How Physically Unclonable Function (PUF) Technology Protects Embedded Systems


Security experts have been excited about the promise of physically unclonable function (PUF) technology for many years. It wasn't until recently, however, that reliable, cost-effective ICs with integrated PUF technology became available on the market. What's driving all of the excitement over PUF? In this white paper, I'll demystify PUF and highlight how it benefits a variety of embedded system... » read more

What Makes A Chip Tamper-Proof?


The cyber world is the next major battlefield, and attackers are busily looking for ways to disrupt critical infrastructure. There is widespread proof this is happening. “Twenty-six percent of the U.S. power grid was found to be hosting Trojans," said Haydn Povey, IAR Systems' general manager of embedded security solutions. "In a cyber-warfare situation, that's the first thing that would b... » read more

PUF, The Magic IoT Defender


How would you feel if you put hours of effort and your ingenuity into designing a product, only to find cheaper copycats on the market? And what if, over time, those copycats failed and somehow eroded your company’s brand reputation? It happens more often than it should, especially as hackers up their game in sophistication and consumers get attracted to lower cost options. So that’s why... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing — health An injectable biosensor may someday help measure signs of influenza. DARPA (the U.S. Department of Defense’s Defense Advanced Research Projects Agency) and digital health startup Profusa announced a study that uses Profusa’s Lumee Oxygen Platform to find ways to identify flu outbreaks, biological attacks and pandemics as much as three weeks earlier than curre... » read more

IP Security In FPGAs


Quinn Jacobson, strategic architect at Achronix, talks about security in FPGAs, including how to prevent reverse engineering of IP, how to make sure the design is authentic, and how to limit access to IP in transit and in the chip. » read more

New Approaches To Security


Different approaches are emerging to identify suspicious behavior and shut down potential breaches before they have a chance to do serious damage. This is becoming particularly important in markets where safety is an issue, and in AI and edge devices where the rapid movement of data is essential. These methods are a significant departure from the traditional way of securing devices through l... » read more

System Bits: Feb. 26


Firefly microstructures in LED light bulbs Pennsylvania State University researchers wanted to improve the energy efficiency of commercial light-emitting diode light bulbs to save even more energy. They found the answer in the lantern surface of fireflies. "LED lightbulbs play a key role in clean energy," said Stuart (Shizhuo) Yin, professor of electrical engineering at Penn State. "Overall... » read more

Blockchain May Be Overkill for Most IIoT Security


Blockchain crops up in many of the pitches for security software aimed at the industrial IoT. However, IIoT project owners, chipmakers and OEMs should stick with security options that address the low-level, device- and data-centered security of the IIoT itself, rather than the effort to promote blockchain as a security option as well as an audit tool. Only about 6% of Industrial IoT (IIoT) p... » read more

← Older posts