Security For Android-Based Ecosystem With Mobile Storage IP


By Biswanath Tayenjam and Licinio Sousa Users are storing more sensitive data in flash memory on their mobile applications such as digital cameras, smart phones and tablets. Because of this reason, the Joint Electron Device Engineering Council (JEDEC) have developed two storage interface standards using inline encryption to secure data: embedded Multimedia Controller (eMMC) and Universal Fla... » read more

Power/Performance Bits: Dec. 12


Sunny days slow 5G 5G networks promise a world of fast wireless data speeds and connected everything.  However, researchers at Embry-Riddle Aeronautical University and King Saud University found that hot, sunny weather could degrade 5G cellular transmissions by more than 15%. The researchers focused on how solar radio emissions would affect the unlicensed 60 GHz bands, part of the millimet... » read more

Securing Your Test System


Test systems, like other industrial equipment, are vulnerable to cyber attacks. That requires a phased approach to cyber security, addressing the most likely threats first and communicating with suppliers to understand threats upstream in the supply chain. To read more, click here. » read more

Preventing IoT Edge Device Vulnerabilities


As an EDA toolchain provider, Mentor keeps a close eye on security issues that occur in the world of electronics. We see volumes of research centered on protecting complex SoCs from attacks and interesting studies about detecting malicious logic in these ICs. But, security issues around IoT edge devices are rarely mentioned in the literature. However, the projected billions of IoT edge devices ... » read more

Securing The Industrial Internet Of Things


Objects, sensors, actuators and controllers that were once designed for stand-alone operation are now increasingly connected by means of intelligent software and networks – forming the basis of the Industrial Internet of Things (IIoT). To be sure, GE defines the IIoT as “a network of a multitude of devices connected by communications technologies that results in systems that can monitor, co... » read more

Securing Automotive Over-The-Air (SOTA) Updates


Modern vehicles are essentially a network of networks – equipped with a range of embedded communication methods and capabilities. Consequently, there is broad industry consensus that vehicle cyber security should rank as a top priority for the automotive sector. In this context, automotive OEMs have begun to provide secure over-the-air (SOTA) updates for various systems. Recently, the non-... » read more

Tech Talk: MCU Acceleration


Tony Kozaczuk, director of Solutions Architecture at Flex Logix, talks about how to add programmability, efficiency, and speed into microcontrollers. https://youtu.be/rDZFjlut_N8 » read more

State Of The IoT


The Internet of Things represents many things to many people, and many of them are not good. For some it is either a laughingstock or a punching bag. For IT, it is a subject of derision because securing all connected devices at the edge is a nightmare. But in all cases, the general consensus is that the IoT has failed to live up to expectations and a level of hype not seen since the dot-com ... » read more

5 Pitfalls That May Kill The IoT


A couple of weeks ago I participated in a panel titled “The Road to a Trillion Devices” organized by Brian Fuller at Arm TechCon. His closing question was whether we will get to the projected trillion devices in twenty years. My answer was that we may even get there faster. His opening question was what the pitfalls would be to make it difficult to get to trillion devices in the next twenty... » read more

Different Approaches To Security


Everyone acknowledges the necessity for cybersecurity precautions, yet the world continues to be challenged by an invisible, inventive army of hackers. The massive data breach at Equifax was only the latest in a series of successful cyberattacks on the credit monitoring firm. Lessons learned from the previous breaches apparently didn’t mitigate this year’s embarrassment for the company. ... » read more

← Older posts