How To Implement A Secure IoT System On ARMv8-M


Attacks on IoT devices are guaranteed - they will happen! Therefore, system security needs to be easy and fast to implement. With ARM's newest embedded processors - the ARM Cortex-M23 and Cortex-M33 with TrustZone for ARMv8-M - developers can take advantage of hardware-enforced security. Now, system designers have the challenge to extend security throughout the whole system. Join this techni... » read more

Testing For Security


Ever since the IoT became a household name, people have been strategizing about ways to utilize non-secure devices to mount an attack. The first instances of using electricity to overload a device's circuits, thereby neutralizing existing security features, came to light in some of the earliest car hacking incidents. These are basically side-channel attacks using what amounts to an electroni... » read more

Quality Issues Widen


As the amount of semiconductor content in cars, medical and industrial applications increases, so does the concern about how long these devices will function properly—and what exactly that means. Quality is frequently a fuzzy concept. In mobile phones, problems have ranged from bad antenna placement, which resulted in batteries draining too quickly, to features that take too long to load. ... » read more

Internet Security? Not Even Close


This week's outage at Amazon Web Services is yet another reminder that Internet security is still not quite there. Amazon isn't a second-tier cloud services provider. It's one of the biggest cloud companies on the planet. If Amazon can't get it right, it's hard to imagine anyone can. The company's Simple Storage Service, aka S3, was the target, and it took about five hours before this online... » read more

The Evolving Ransomware Threat


Ransomware has become a serious threat in recent years, with thousands of new variants surfacing in 2016 alone. This is really bad news for system administrators, as computers infected with ransomware are typically locked down until cyber criminals are given a hefty sum to unlock encrypted files. Disturbingly, IDG recently confirmed the existence of a new file-encrypting ransomware program f... » read more

Side-Channel Attacks


There are many techniques available for hackers to gain access to a system and obtain secret keys or other proprietary information– from invasive methods, such as microprobing, to noninvasive methods, such as cryptoanalysis. However, one of the easiest and most effective ways to extract the contents of a chip is through a side-channel attack using power analysis. To read more, click here. » read more

Dealing With Unintended Behavior


Functional verification was already tough enough, but having to identify behaviors that were never defined or intended opens up the search space beyond what existing tools are capable of handling. However, while you may not be able to eliminate unintended behaviors, a design team is not helpless. There are several steps that can be taken to reduce the likelihood of these problems getting int... » read more

Test More Complex For Cars, IoT


With increasing focus on safety-critical semiconductors—driven by ADAS, IoT, and security—functional safety concerns are going through the roof. Engineering teams are scrambling to determine how to conduct better in-field or online testing because test no longer can be an afterthought. This has been a common theme across the automotive ecosystem for the past few years, and as the automot... » read more

Fix Processes, Then Silos


Jack Welch, former CEO of GE, was a big proponent of what he called a "boundaryless corporation." It was a good sound bite, but it pales in comparison to former Intel CEO Andy Grove's philosophy of working out of a cubicle, just like the rest of his staff. While it's great to have corporate buy-in for breaking down silos, which are vertically integrated, the real problem for semiconductor c... » read more

Connected Car Driving Change In Defect Detection


Automotive product design is rapidly evolving and the magnitude and pace of change facing engineering organizations is challenging incumbent processes and resources, especially in the area of software design. While connected cars are not new, the frequency and depth to which the industry is embracing this dynamic is accelerating. Software has emerged as a primary vehicle for innovation and diff... » read more

← Older posts Newer posts →