Cost-Effective, Silicon-Based Security Reduces Risks, Achieves Competitive Advantage


IDC Spotlight, by Robert Westervelt, Research Director, Security Products, sponsored by Rambus. Device manufacturers are increasingly under pressure to address security and privacy. Cost-effective, silicon-based security is among the components that can significantly reduce the risk of physical attacks and cyberattacks and achieve a competitive advantage over both legacy and insecure solutio... » read more

Securing IoT Devices With A Programmable Root Of Trust


The exponential increase of vulnerable IoT devices demands a far more determined and proactive approach to security than is offered by the current industry status quo. This is because compromised IoT devices pose a threat to both consumers and critical internet infrastructure. For example, a compromised security camera or baby video monitor can be easily exploited to violate consumer privacy... » read more

IP Security In FPGAs


Quinn Jacobson, strategic architect at Achronix, talks about security in FPGAs, including how to prevent reverse engineering of IP, how to make sure the design is authentic, and how to limit access to IP in transit and in the chip. » read more

A Complete System-Level Security Verification Methodology


Hardware is at the root of all digital systems, and security must be considered during the system-on-chip (SoC) design and verification process. Verifying the security of an SoC design is challenging because of time to market pressure and resource constraints. Resources allocated to the already time-consuming task of functional verification must be diverted to security verification, which requi... » read more

Blog Review: Sept. 4


Synopsys' Taylor Armerding checks out Apple's newly expanded bug bounty program, with bounty payouts are increasing to compete with malicious actors, and why even with security-oriented development the practice of bug bounties will remain needed. Mentor's Colin Walls shares a few more embedded software tips, this time on external variables, delay loops in real time systems, and meaningful pa... » read more

Power/Performance Bits: Aug. 27


The sound of typing Cybersecurity researchers at the Southern Methodist University found a way to detect what a user is typing based on sensor data collected from a nearby smartphone. The team found that acoustic signals produced by typing on a computer keyboard can successfully be picked up by a smartphone, which can then be processed to determine which keys were struck – even in noisy conf... » read more

Chip Security Needs A New Language


By Sven Beyer and Sergio Marchese Safety- and security-critical systems, such as connected autonomous vehicles, require high-integrity integrated circuits (ICs). Functional correctness and safety are necessary to establish IC integrity, but not sufficient. Security is another critical pillar of IC integrity. Systems and products using ICs with security vulnerabilities ultimately undermine th... » read more

Responsibility And Automotive Security


I came across this excellent, thought-provoking white paper from NTT Security and felt that some of the insights were worth sharing. Some of our previous blogs have discussed the cost implications of automotive cybersecurity for vehicle manufacturers, and the potential implications for the driver and passengers of vehicles. But this paper got me thinking about another angle – responsibilit... » read more

Configure, Confirm, Ship


Security is a first-order design requirement for processor-based systems. Processor designers implement security functionality directly into the hardware itself to protect the system at its most fundamental layer. System integrators that use processor IP such as Synopsys’ DesignWare® ARC® processors must ensure that they configure and manage the protection and security features correctly, a... » read more

The Great Test Blur


As chip design and manufacturing shift left and right, concerns over reliability are suddenly front and center. But figuring out what exactly what causes a chip to malfunction, or at least not meet specs for performance and power, is getting much more difficult. There are several converging trends here, each of which plays an integral role in improving reliability. But how significant a role... » read more

← Older posts