Automotive Outlook: 2022


The auto industry is widening its focus this year, migrating to new architectures that embrace better security, faster data movement, and eventually more manageable costs. The auto industry is facing both short-term and long-term challenges. In the short term, the chip shortage continues to top the list of concerns for the world's automakers. That shortage has delayed new vehicle deliveries,... » read more

Security Starts With A Threat Assessment


Developing the security architecture for an electronic device begins with building a threat model wherein we ask these questions: What is the operational environment in which the device needs to function? What type of attacks can be identified? What level of access does a potential attacker have to the device? What possible attack paths can an attacker exploit? What resources (... » read more

Making PUFs Even More Secure


As security has become a must-have in most systems, hardware roots of trust (HRoTs) have started appearing in many chips. Critical to an HRoT is the ability to authenticate and to create keys – ideally from a reliable source that is unviewable and immutable. “We see hardware roots of trust deployed in two use models — providing a foundation to securely start a system, and enabling a se... » read more

Cybersecurity For Cars Starts With Chips And IP


The automotive industry is undergoing a significant transformation. Cars are becoming more sophisticated and valuable with increased connectivity and capabilities to provide a better user experience. They are also collecting and transmitting more and more sensitive data and thus are becoming very attractive targets for attacks. Cybercrime in the automotive industry is growing rapidly. How bad i... » read more

High-Quality Test And Embedded Analytics For Secure Applications


Designs for secure applications such as smart cards and those used in the defense industry require security to ensure sensitive data is inaccessible to outside agents. This used to be a somewhat niche requirement and the implementation of custom solutions to meet these specific requirements was common. However, with the explosion within the semiconductor industry of automotive and cyber-phys... » read more

Hardware Root of Trust: Everything You Need To Know


As explained in our “Secure Silicon IP Webinar Series“, a root of trust is the security foundation for an SoC, other semiconductor device or electronic system. However, its meaning differs depending on who you ask. For example, the hardware root of trust contains the keys for cryptographic functions and is usually a part of the secure boot process providing the foundation for the software c... » read more

Securing Short-Range Communications


Short-range wireless communication technology is in widespread use and growing rapidly, adding conveniences for consumers while also opening the door to a whole range of cyberattacks. This technology is common across a variety of applications, from wireless key fobs to unlock a car and start the ignition, to tags used to help drivers find misplaced items such as car keys. RFID also is starti... » read more

Big Changes Ahead For Inside Auto Cabins


The space we occupy inside our vehicles is poised to change from mere enclosure to participant in the driving experience. Whether for safety or for comfort, a wide range of sensors are likely to appear that will monitor the “contents” of the vehicle. The overall approach is referred to as an in-cabin monitoring system (ICMS), but the specific applications vary widely. “In-cabin sensing... » read more

Architecting Hardware Protection For Data At Rest And In Motion


Planning the security architecture for any device begins with the threat model. The threat model describes the types of attacks that the device or application may face and needs to be protected against. It is based on what attackers can do, what level of control they have over the product (i.e., remote or direct access), and how much effort and money they are willing and able to spend on an att... » read more

Securing Connected And Autonomous Vehicles


Vehicles are on track to become highly sophisticated Internet of Things (IoT) devices. With the added functionality that connects vehicles to other vehicles, the infrastructure, and even pedestrians, the opportunity for hacking expands. Challenges like complexity and the burden of legacy systems further complicate the situation. The future of connected and autonomous vehicles (CAV) demands leve... » read more

← Older posts Newer posts →