Big Changes Ahead For Inside Auto Cabins


The space we occupy inside our vehicles is poised to change from mere enclosure to participant in the driving experience. Whether for safety or for comfort, a wide range of sensors are likely to appear that will monitor the “contents” of the vehicle. The overall approach is referred to as an in-cabin monitoring system (ICMS), but the specific applications vary widely. “In-cabin sensing... » read more

Architecting Hardware Protection For Data At Rest And In Motion


Planning the security architecture for any device begins with the threat model. The threat model describes the types of attacks that the device or application may face and needs to be protected against. It is based on what attackers can do, what level of control they have over the product (i.e., remote or direct access), and how much effort and money they are willing and able to spend on an att... » read more

Securing Connected And Autonomous Vehicles


Vehicles are on track to become highly sophisticated Internet of Things (IoT) devices. With the added functionality that connects vehicles to other vehicles, the infrastructure, and even pedestrians, the opportunity for hacking expands. Challenges like complexity and the burden of legacy systems further complicate the situation. The future of connected and autonomous vehicles (CAV) demands leve... » read more

Why It’s So Difficult — And Costly — To Secure Chips


Rising concerns about the security of chips used in everything from cars to data centers are driving up the cost and complexity of electronic systems in a variety of ways, some obvious and others less so. Until very recently, semiconductor security was viewed more as a theoretical threat than a real one. Governments certainly worried about adversaries taking control of secure systems through... » read more

Importance Of Programmability In Next-Generation Security Appliances


Traditional methods of deploying network security through software-based firewalls do not scale because the latency and bandwidth requirements cannot be addressed. The flexibility and configurability of Xilinx adaptive devices combined with IP and tool offerings significantly improves security processing performance. This white paper explores multiple firewall architectures, which include so... » read more

Securing Connected Medical Devices For FDA Submissions


The benefits and challenges of the Internet of Things (IoT) are especially evident in healthcare, thanks to increases in the volume and use of medical devices. Network-connected devices have greatly improved patient care by helping healthcare providers monitor vital signs, regulate medication dosages, improve diagnostics, and ultimately improve patient outcomes while lowering costs. This whi... » read more

Creating IoT Devices That Will Remain Secure


What’s secure today may not be secure in the future, and even if you include an IoT device with state-of-the-art security, it may be surrounded by less secure devices. Steve Hanna, distinguished engineer at Infineon, examines the impact of security on IoT adoption, why resilience across a system is the new target for secure designs, and how to minimize the impact of less secure devices. » read more

Zonal Architectures Play Key Role In Vehicle Security


The automotive ecosystem is starting to shift toward zonal architectures, making vehicle functionality less dependent on the underlying hardware and allowing more flexibility in what gets processed where. The impact of that shift is both broad and significant. For carmakers, it could lead to hardware consolidation and more options for failovers in case something goes wrong with any system in... » read more

AI/ML Workloads Need Extra Security


The need for security is pervading all electronic systems. But given the growth in data-center machine-learning computing, which deals with extremely valuable data, some companies are paying particular attention to handling that data securely. All of the usual data-center security solutions must be brought to bear, but extra effort is needed to ensure that models and data sets are protected ... » read more

A Deeper Look into RowHammer’s Sensitivities: Experimental Analysis of Real DRAM Chips and Implications on Future Attacks and Defenses


Abstract "RowHammer is a circuit-level DRAM vulnerability where repeatedly accessing (i.e., hammering) a DRAM row can cause bit flips in physically nearby rows. The RowHammer vulnerability worsens as DRAM cell size and cell-to-cell spacing shrink. Recent studies demonstrate that modern DRAM chips, including chips previously marketed as RowHammer-safe, are even more vulnerable to RowHammer than... » read more

← Older posts Newer posts →