Arm is putting together a security framework that the company is assembling to support, at least initially, IoT devices based on the Cortex v8M architecture.
The Prpl Foundation has published a guide to techniques it claims will improve the security of embedded systems.
Dassault Systèmes and IC Manage have each developed "big data" mining software tools to track the progress of chip-design projects
By widening the range of resources that can be tracked within an SoC, Ultrasoc says it has uncovered ways to make debug a long-term tool for complex multicore designs.
Formal-verification specialist OneSpin is setting up its own equivalent of an app store, building on top of a formal engine the company now licenses to other companies.
Imagination Technologies plans to introduce support for virtualization across all its processor cores, including signal processors such as the Ensigma family, as part of a plan to improve SoC security.
Startup Tortuga Logic has developed a toolkit for checking the security aspects of SoC hardware designs.
ARM CTO Mike Muller called for IP to be used throughout the IoT as part of a strategy for secure systems at a recent NMI seminar at Bletchley Park, England.
Designers will need to take crime into account as part of their design signoff process, Wally Rhines argued in his keynote at Mentor Graphics' U2U San Jose 2015 conference.
Unsettled by attacks on embedded devices such as the point-of-sale terminals used by retailers such as Target and the potential for hackers to target critical infrastructure, the industry focused squarely on security at this year’s Embedded World in Nürnberg, Germany.
View All Sponsors