Arm Enterprise Virtualization With Arm System IP, Backplane Integration And Performance


Virtualization has become ubiquitous across the infrastructure market, increasing efficiency and security, boosting productivity and reducing operating costs. However, system performance remains crucial to ensuring a virtualized environment does not affect the end user’s experience. Performance within this environment depends on a number of factors such as transaction bandwidth, latencies an... » read more

5 Reasons Why E-Commerce Sites Need A Token Gateway


Card-on-file is fundamental to the digital commerce ecosystem, as it facilitates the delivery of payment methods such as one-click ordering and recurring payments. As merchants and PSPs move towards implementing card-on-file EMV payment tokenization, solutions that simplify integration and ongoing maintenance, while adding additional value, can deliver considerable competitive advantages. ... » read more

The Revenge Of The Digital Twins


How do we verify artificial intelligence? Even before “smart digital twins” get as advanced as shown in science fiction shows, making sure they are “on our side” and don’t “go rogue” will become a true verification problem. There are some immediate tasks the industry is working on—like functional safety and security—but new verification challenges loom on the horizon. As in pr... » read more

Tineola: Taking A Bite Out Of Enterprise Blockchain


Enterprise blockchain adoption reached a fever pitch in 2018, but the security community has been late to the game of securing these platforms against attacks. We wanted to bridge the gap between the widespread use of enterprise blockchain platforms and the limited knowledge we have about their security by exploring the leading enterprise platform, Hyperledger Fabric, from the perspective of a ... » read more

The Security Penalty


It's not clear if Meltdown, Spectre and Foreshadow caused actual security breaches, but they did prompt big processor vendors like Intel, Arm, AMD and IBM to fix these vulnerabilities before they were made public by Google's Project Zero. While all of this may make data center managers and consumers feel better in one respect, it has created a level of panic of a different sort. For decades,... » read more

Enabling Cheaper Design


While the EDA industry tends to focus on cutting edge designs, where design costs are a minor portion of the total cost of product, the electronics industry has a very long tail. The further along the tail you go, the more significant design costs become as a percent of total cost. Many of those designs are traditionally built using standard parts, such as microcontrollers, but as additional... » read more

Is Your AI SoC Secure?


As artificial intelligence (AI) enters every application, from IoT to automotive, it is bringing new waves of innovation and business models, along with the need for high-grade security. Hackers try to exploit vulnerabilities at all levels of the system, from the system-on-chip (SoC) up. Therefore, security needs to be integral in the AI process. The protection of AI systems, their data, and th... » read more

Finding Security Holes In Hardware


At least three major security holes in processors were identified by Google's Project Zero over the past year, with more expected to roll out in coming months. Now the question is what to do about them. Since the beginning of the PC era, two requirements for hardware were backward compatibility and improvements in performance with each new version of processors. No one wants to replace their... » read more

The Rising Need for Satellite Security


Satellites today contain highly complex embedded microelectronics systems complete with processing, data storage, and data receiving/transmitting capabilities. Further, they are controlled by ground stations, computers in data centers. They are therefore susceptible to threats prevalent in cloud computing architectures including insider threats, malicious downloads, etc. As such, satellite secu... » read more

‘Fuzzing’ A Virtual Prototype ECU To Improve Security


Staying ahead in the arms race against hackers means constantly looking for novel ways to find and correct security flaws, including (and perhaps especially) when it comes to relatively low-level hardware. In this brief white paper we describe one such way — an automated fuzzing test of a virtual ECU to find and correct vulnerabilities during the upstream development process. To read more,... » read more

← Older posts Newer posts →