Embedded Security Using Cryptography


In the previous blog post, “Securing Offload Engines for a Robust Secure SoC System,” we briefly looked at some of the methods employed for achieving embedded security, i.e., cryptography, hardware partitioning and isolation, and hardware root of trust. In this blog, and subsequent blogs, we will explore more about each of these approaches in detail. Cryptography is not a new concept. It... » read more

Building A More Secure SoC


SoC integrators know that a software-only chip security plan leaves devices open to attack. All that a hacker needs to do is find a way to replace key parts of the bootloader or the low-level firmware to compromise other software in the system used to support secure access. The most simple attacks come remotely over a network, and these can be patched with software upgrades. However, we see ... » read more

Protecting Automotive SoCs Starts With Secure IP


The automotive industry is undergoing a significant transformation. Cars are becoming more sophisticated and valuable with increased connectivity and capabilities to provide a better user experience. They are also collecting and transmitting more and more sensitive data and thus are becoming very attractive targets for attacks. Cybercrime in the automotive industry is growing rapidly. How bad i... » read more

Does Your IC Security Need A Renovation?


Five years ago, I moved from Silicon Valley to Gig Harbor, Washington and bought a fixer-upper. As part of my ongoing (and extensive) home renovations, I just finished having the entire exterior redone: roof, siding, paint, masonry, front porch, back deck, outdoor lighting, the works. If you’ve ever embarked on any kind of home remodel project, I don’t have to tell you that the process incl... » read more

Auto Displays: Bigger, Brighter, More Numerous


Displays are rapidly becoming more critical to the central brains in automobiles, accelerating the adoption and evolution of this technology to handle multiple types of audio, visual, and other data traffic coming into and flowing throughout the vehicle. These changes are having a broad impact on the entire design-through-manufacturing flow for display chip architectures. In the past, these ... » read more

Securing The SoC Life Cycle


Over the course of its life, an SoC (system on chip) goes through multiple life cycle states which are different in character and have varying and sometimes contradictory security requirements. In each state, the SoC may be under different ownership in the supply chain. Also, as it transitions through different manufacturing phases, it is subject to a different set of possible attacks, which sh... » read more

The Evolving Landscape Of SoC Vulnerabilities And Analog Threats


SoC integrators know that a software-only chip security plan leaves devices open to attack. The more effective way to thwart hackers is to combat both digital and analog threats by incorporating security-focused hardware modules built into the core machine design. This paper describes sources of vulnerabilities to cyber attacks and what infrastructure is needed to secure against them. The So... » read more

Changes In Auto Architectures


Automotive architectures are changing from a driver-centric model to one where technology supplements and in some cases replaces the driver. Hans Adlkofer, senior vice president and head of the Automotive Systems Group at Infineon, looks at the different levels of automation in a vehicle, what’s involved in the shift from domain to zonal architectures, why a mix of processors will be required... » read more

Securing 5G And IoT With Fuzzing


5G will revolutionize many industries, with up to 100 times the speed, 100 times the capacity, and one-tenth the latency compared to 4G LTE. But in addition to providing superior performance, 5G expands the attack surface of apps and IoT devices that rely on this next-gen network. In addition to known security exploits, we’re bound to see unknown, novelty attacks. Fuzz testing (or fuzzing)... » read more

A Methodology To Verify Functionality, Security, And Trust for RISC-V Cores


Modern processor designs present some of the toughest hardware verification challenges. These challenges are especially acute for RISC-V processor core designs, with a wide range of variations and implementations available from a plethora of sources. This paper describes a verification methodology available to both RISC-V core providers and system-on-chip (SoC) teams integrating these cores. It... » read more

← Older posts Newer posts →