design security

October 23, 2017

Arm plans secure reference architecture for Cortex-M

Arm is putting together a security framework that the company is assembling to support, at least initially, IoT devices based on the Cortex v8M architecture.
Article  |  Topics: Blog - Embedded, IP  |  Tags: , , , ,   |  Organizations:
January 8, 2016

Prpl Foundation proposes security architecture

The Prpl Foundation has published a guide to techniques it claims will improve the security of embedded systems.
Article  |  Topics: Blog - Embedded  |  Tags: , , , , ,   |  Organizations:
June 11, 2015

Data mining tools trawl for IC icebergs

Dassault Systèmes and IC Manage have each developed "big data" mining software tools to track the progress of chip-design projects
Article  |  Topics: Blog - EDA  |  Tags: , , ,   |  Organizations: ,
June 9, 2015

Debug life cycle expands with on-chip infrastructure

By widening the range of resources that can be tracked within an SoC, Ultrasoc says it has uncovered ways to make debug a long-term tool for complex multicore designs.
Article  |  Topics: Blog - Embedded, IP  |  Tags: , , , , ,   |  Organizations:
May 21, 2015

OneSpin uses app-store approach to open up formal verification

Formal-verification specialist OneSpin is setting up its own equivalent of an app store, building on top of a formal engine the company now licenses to other companies.
May 20, 2015

Imagination to extend virtualization across the SoC

Imagination Technologies plans to introduce support for virtualization across all its processor cores, including signal processors such as the Ensigma family, as part of a plan to improve SoC security.
May 19, 2015

Tortuga introduces security checks for SoC designs

Startup Tortuga Logic has developed a toolkit for checking the security aspects of SoC hardware designs.
Article  |  Topics: Blog - EDA, IP  |  Tags: ,   |  Organizations:
May 13, 2015

ARM calls for Internet Protocol to the edge in security play

ARM CTO Mike Muller called for IP to be used throughout the IoT as part of a strategy for secure systems at a recent NMI seminar at Bletchley Park, England.
Article  |  Topics: Blog - Embedded  |  Tags: , , , ,   |  Organizations:
April 21, 2015

Are you ready for design for crime?

Designers will need to take crime into account as part of their design signoff process, Wally Rhines argued in his keynote at Mentor Graphics' U2U San Jose 2015 conference.
Article  |  Topics: Blog - EDA, IP  |  Tags: , , , ,   |  Organizations:
February 26, 2015

Embedded world wakes up to security

Unsettled by attacks on embedded devices such as the point-of-sale terminals used by retailers such as Target and the potential for hackers to target critical infrastructure, the industry focused squarely on security at this year’s Embedded World in Nürnberg, Germany.

PLATINUM SPONSORS

Synopsys Cadence Design Systems Mentor - A Siemens Business
View All Sponsors