Zero Trust Security In Chip Manufacturing


More equipment vendors and more IP are making the data in a fab much more valuable than in the past, and a potential target for hackers. What’s needed is a different approach to architecting and deploying services and equipment, so breaches can be stopped before they affect other equipment and data, and a better way of sharing data. Brian Buras, production analytics solution architect at Adva... » read more

Building Better Cars Faster


Carmakers are accelerating their chip and electronic design schedules to remain competitive in an increasingly fast-changing market, but they are encountering gaps in the tooling, the supply chain, and in the methodologies they use to create those cars. While it's easy to envision how CAD software could be used to create the next new vehicle’s 3-D look, and how simulation software helps de... » read more

Protecting High-Speed Network Traffic With MACsec


By Dana Neustadter and Jerry Lotto There is an ever-increasing demand for bandwidth, driven by an exponential growth in the number of devices connected to the cloud and a broadening variety of sensors, applications, and services, resulting in an explosion of data traffic. This in turn, drives the proliferation of high bandwidth interfaces such as Ethernet, PCIe/CXL, and DDR to sustain faster... » read more

Solving Problems With The IoT


The Internet of Things, a term once applied to almost any "smart" gadget connected to the Internet, is becoming more useful, more complex, and more of a security risk as the value of data continues to grow and more people depend on IoT technology. In the decades since the concept was first introduced, IoT devices have become so ubiquitous that applications cover practically every consumer, c... » read more

Security Highlight: Exploiting Persistent Faults In Crypto


At the most recent CHES workshop, Hossein Hadipour of the Graz University of Technology presented an important step forward in exploiting persistent faults in crypto. Differential Fault Analysis (DFA) is a well-known attack class that can lead to the compromise of a secret key when faults are injected during the execution of a cryptographic implementation. However, injecting transient fault... » read more

Automotive Security Vulnerabilities From Afar


Don't confuse automotive security with automotive safety, things like functional safety (FuSa) and ISO 26262. You need security to have safety. But security is its own thing. In a modern connected car, there are two places for security vulnerabilities. One is in the car itself. And the other is back at base in the automotive manufacturer's (OEM in the jargon) data centers, which the cars are co... » read more

Forgotten Essence Of The Backend Penetration Testing


At Riscure we have observed many severe security issues exploited by hackers even in previously certified solutions. In recent years, certification, which aims to minimize security risks, has become more important, especially in the mobile application industry. However, certification compliance is sometimes still not sufficient. This is especially noticeable when the solution’s functionality ... » read more

Countering The Threat From Quantum Computers


Quantum computers hold much promise for the future, yet their computing power poses a significant threat to current security methods such as public key cryptography. In this white paper, Infineon will examine this issue in detail, propose an approach for future security based on TPMs and discuss current TPM technology. The reader can expect to gain a good appreciation of the security issues sur... » read more

Week In Review: Auto, Security, Pervasive Computing


The U.S. Department of Defense updated the directive that governs the development and fielding of autonomous and semi-autonomous weapon systems. The revisions include an expanded focus on artificial intelligence, and reference to recently-established organizations like the DoD’s Chief Digital and Artificial Intelligence Office. NIST released a new guidance document aimed at helping organi... » read more

EV Architectures Evolving For Communication, Connectivity


Electric vehicle architectures are rapidly evolving to accommodate multiple forms of connectivity, including in-vehicle, vehicle-to-vehicle, and vehicle-to-infrastructure communication. But so far, automotive OEMs have yet to come to a consensus on the winning technologies or the necessary standards — all of which will be necessary as cars become increasingly autonomous and increasingly inter... » read more

← Older posts Newer posts →