security

March 8, 2017

Verification Futures tackles safety and security

The Verification Futures conference organized by European EDA consultancy TV&S returns for its seventh year in early April with a focus on safety and security in the growing area of cyber-physical systems.
Article  |  Topics: Blog - EDA, Embedded  |  Tags: , , , ,   |  Organizations:
March 8, 2017

IoT security seminar heads to US

The NMI's IoT Security Foundation is organizing a seminar on embedded systems security in Silicon Valley at the end of March.
Article  |  Topics: Blog - Embedded  |  Tags: , , ,   |  Organizations:
February 14, 2017

Software brings secure IDs to almost any device

Intrinsic-ID has developed software that allows its PUF technology to be used in most systems that contain static memory together with a framework for managing secure keys in the supply chain.
Article  |  Topics: Blog - Embedded, IP  |  Tags: , , ,
February 3, 2017

Penetration test tools extend reach into embedded devices

The Metasploit collection of tools used by penetration testers to find security flaws in software now has a bridge to deeply embedded hardware devices, developed by analytics company Rapid7.
December 22, 2016

Webinar discusses SoC security, area, and power trade-offs

SoC security strategies, costs and trade-offs are analysed in this detailed webinar.
Article  |  Topics: Blog - IP  |  Tags: , ,   |  Organizations:
December 15, 2016

Benchmark effort to look at IoT security performance

EEMBC has launched a benchmarking effort to test the performance of security and crypto-functions on embedded devices.
Article  |  Topics: Blog - Embedded  |  Tags: , ,   |  Organizations:
December 6, 2016

Security group publishes first guidelines

The UK's IoT Security Foundation has published the first set of documents intended to provide best-practice guidelines for developers of embedded systems.
Article  |  Topics: Blog - Embedded  |  Tags: ,
October 25, 2016

ARM brings security to Cortex-M family

ARM has launched the first of a series of Cortex-M series microcontrollers based on the V8M architecture that incorporate the Trustzone security mechanism.
Article  |  Topics: Blog - Embedded, IP  |  Tags: , , , ,   |  Organizations:
May 25, 2016

ECC crypto code and core aim for home automation

Oberon Microsystems has ported a set of low-overhead cryptographic codes suitable for Apple's HomeKit to the Cortus APS3RP 32bit processor core.
Article  |  Topics: Blog - Embedded, IP  |  Tags: , , , ,   |  Organizations:
February 25, 2016

Security focus for Embedded World

Security took center stage at the Embedded World show in N├╝rnberg this week, with a number of vendors launching software intended to help protect against hacks.
Article  |  Topics: Blog - Embedded  |  Tags: , , ,   |  Organizations:

PLATINUM SPONSORS

Synopsys Cadence Design Systems Mentor - A Siemens Business
View All Sponsors