Bluetooth Mesh Drives Security For Automotive Applications


The use of Bluetooth technology continues to grow beyond mobile into rapidly expanding IoT and automotive applications. Consumers have grown to expect hands-free calling via Bluetooth, however, as the technology moves to other use cases such as tire pressure monitors or door lock connectivity, security becomes a key challenge to automotive SoC designers. Bluetooth-enabled devices have been a... » read more

IoT Security Manifesto


Securing tomorrow means rethinking how we design intelligent devices by embracing concepts from outside the digital realm and taking advantage of advanced new technologies. Some of the things the Arm Security Manifesto explores: A digital immune system. Technologists develop human-like immune systems and health-care services that automatically detect, quarantine and treat any cyber inf... » read more

Protecting Electronic Systems From Side-Channel Attacks


During the early days of safecracking, rudimentary rotary locks were compromised by feel or sound to determine the correct combination. Following in this tradition, malicious actors are now exploiting side-channel attacks (SCA) to compromise cryptographic systems. To be sure, all physical electronic systems routinely leak information about the internal process of computing via fluctuating level... » read more

Thwarting Side-Channel Attacks With DPA-Protected Software Libraries


All physical electronic systems routinely leak information about the internal process of computing via fluctuating levels of power consumption and electro-magnetic emissions. Much like the early days of safecracking, electronic side-channel attacks (SCA) eschew a brute force approach to extracting keys and other secret information from a device or system. Moreover, SCA conducted against elec... » read more

Who’s Responsible For Security?


Semiconductor Engineering sat down to discuss security issues and how to fix them with Mark Schaeffer, senior product marketing manager for secure solutions at Renesas Electronics; Haydn Povey, CTO of Secure Thingz; Marc Canel, vice president of security systems and technologies at [getentity id="22186" comment="Arm"]; Richard Hayton, CTO of Trustonic; Anders Holmberg, director of corporate dev... » read more

Who Needs OWASP?


A list of critical web application security vulnerabilities is a necessary risk management tool. Equally true is that each organization has a different set of vulnerabilities plaguing their applications. To complete a trifecta of fundamental truths, crowdsourced lists such as the OWASP Top 10 rarely reflect an individual organization’s priorities. Given these three points, many organizatio... » read more

Reflection On 2017: Design And EDA


People love to make predictions, and most of the time they have it easy, but at Semiconductor Engineering, we ask them to look back on the predictions they make each year and to assess how close to the mark they were. We see what they missed and what surprised them. Not everyone accepts our offer to grade themselves, but most have this year. (Part one looked at the predictions associated with s... » read more

Reflections On 2017: Manufacturing And Markets


People love to make predictions, and most of the time they have it easy, but at Semiconductor Engineering, we ask them to look back on the predictions they make each year and to assess how close to the mark they were. To see what they missed and what surprised them. Not everyone accepts our offer to grade themselves, but many have this year. This is the first of two parts that looks at the pred... » read more

Security For Android-Based Ecosystem With Mobile Storage IP


By Biswanath Tayenjam and Licinio Sousa Users are storing more sensitive data in flash memory on their mobile applications such as digital cameras, smart phones and tablets. Because of this reason, the Joint Electron Device Engineering Council (JEDEC) have developed two storage interface standards using inline encryption to secure data: embedded Multimedia Controller (eMMC) and Universal Fla... » read more

Power/Performance Bits: Dec. 12


Sunny days slow 5G 5G networks promise a world of fast wireless data speeds and connected everything.  However, researchers at Embry-Riddle Aeronautical University and King Saud University found that hot, sunny weather could degrade 5G cellular transmissions by more than 15%. The researchers focused on how solar radio emissions would affect the unlicensed 60 GHz bands, part of the millimet... » read more

← Older posts Newer posts →