Hardware-Based Cybersecurity For Software-Defined Vehicles


As vehicle technology advances, so does the complexity of the electrical/electronic systems within these smart vehicles. A software-defined vehicle (SDV) relies on centralized compute and an advanced software stack to control most of its functionality, from engine performance to infotainment systems. SDVs are becoming more important as automakers look to improve vehicle performance, reduce emis... » read more

Role Of IoT Software Expanding


IoT software is becoming much more sophisticated and complex as vendors seek to optimize it for specific applications, and far more essential for vendors looking to deliver devices on-time and on-budget across multiple market segments. That complexity varies widely across the IoT. For example, the sensor monitoring for a simple sprinkler system is far different than the preventive maintenanc... » read more

Securely Store Your Credentials And Cryptographic Keys In TPM 2.0


A Trusted Platform Module (TPM) can securely store cryptographic keys that are specific to the host system and provide restricted access to the stored keys and secrets. You can never read out private keys, or in other words retrieve them as is from the TPM. Let’s say you need to generate a signature: you can indicate the private key you wish to use from the TPM to sign the message. You can... » read more

Automotive Security: Meeting The Growing Challenges With Certified Hardware Security Module IP


Automotive systems, and the semiconductors used within them, are some of the most complex electronics seen today. The radical transformation from an isolated mechanical car to a connected software-driven car is driving the increased use of semiconductors in vehicles: these include advanced driver assistance systems (ADAS), electrification, and enhanced driver/passenger experience. More conne... » read more

Secure Implementation Of Post-Quantum Crypto In The Spotlight


The US-based NIST body takes a leading role in the migration to Post-Quantum Crypto (PQC). After a multi-year selection process, in 2022 they preliminarily identified a number of Post Quantum algorithms, which were recommended to replace the current public key algorithms (RSA, ECC). While the process of scrutiny is still ongoing, they now took another important step by putting emphasis on imple... » read more

100G Ethernet At The Edge


The amount of data is growing, and so is the need to process it closer to the source. The edge is a middle ground between the cloud and the end point, close enough to where data is generated to reduce the time it takes to process that data, yet still powerful enough to analyze that data quickly and send it wherever it is needed. But to make this all work requires faster conduits for that data i... » read more

State of the Art And Future Directions of Rowhammer (ETH Zurich)


A new technical paper titled "Fundamentally Understanding and Solving RowHammer" was published by researchers at ETH Zurich. Abstract "We provide an overview of recent developments and future directions in the RowHammer vulnerability that plagues modern DRAM (Dynamic Random Memory Access) chips, which are used in almost all computing systems as main memory. RowHammer is the phenomenon in... » read more

The Hidden Security Risks Of Automotive Electronic Systems


The Internet of things (IoT) is driving new capabilities that are transforming how we live, work and play. However, as our lives become more connected, the risk from hackers and other security breaches increases with every new IoT device. While most of us are pretty well versed in why we need to keep our most trusted devices secure – such as cell phones and laptops – we often don’t think ... » read more

How To Safeguard Memory Interfaces By Design


By Dana Neustadter and Brett Murdock In 2017, the credit bureau Equifax announced that hackers had breached its system, unleashing the personal information of 147-million people. As a result, the company has settled a class action suit for $425 million to aid those impacted, including identity theft, fraud, financial losses, and the expenses to clean up the damage. Whether the threat is iden... » read more

Chiplet Security Risks Underestimated


The semiconductor ecosystem is abuzz with the promise of chiplets, but there is far less attention being paid to security in those chiplets or the heterogeneous systems into which they will be integrated. Disaggregating SoCs into chiplets significantly alters the cybersecurity threat landscape. Unlike a monolithic multi-function chip, which usually is manufactured using the same process tech... » read more

← Older posts Newer posts →