security

January 26, 2018
Ashish Darbari is CEO of formal verification consultancy Axiomise.

Doc Formal: When ‘silicon proven’ is not enough

If we thought about verfication-for-security in a different way, the Spectre and Meltdown vulnerabilities could well have been avoided.
Expert Insight  |  Topics: EDA - Verification  |  Tags: , , , , , ,   |  Organizations:
October 14, 2017
Michael Chen is Director, Design for Security, in the New Ventures Division of Mentor, a Siemens Business.

Making security a profit center for silicon

The assumption has been that extra security eats into profit margins. But with some lateral thinking it can actually improve the bottom line.
May 15, 2017
Dr Walden Rhines is Chairman and CEO of Mentor - A Siemens Business

The Wally Rhines interview – Part Two: AI, automotive and security

This second part looks at Mentor's views on flow neutrality, how DRS360 was born, machine learning and the threat from embedded Trojans.
December 14, 2016
IoTSF eye on security image

Guidelines attempt to build trust in IoT

When developing its security guidelines and checklists for consumer IoT and similar devices, the IoT Security Foundation's working groups tested their recommendations against what is known about real-world hacks and attacks.
Article  |  Topics: Embedded - Architecture & Design, User Experience  |  Tags: , , ,   |  Organizations:
November 24, 2015
Angela Raucher is product line manager for Synopsys’ ARC EM processors.

Taking an end-to-end approach to IoT security

Achieving IoT security means addressing every link in the chain, from the quality of your application code to embedding a root of trust in the hardware.
May 6, 2015
Mike Bartley is CEO of TVS. He has over 25 years' experience of building and managing test and verification teams at STMicroelectronics, Infineon and Elixent/Panasonic. He has consulted on multiple verification projects for companies including ARM and Infineon.

Achieving safety and security in SoC development

Designers will have to update development processes to achieve the rigorous safety certifications required in automotive, rail, avionics and similar markets
Expert Insight  |  Topics: EDA - Verification  |  Tags: , , , ,   |  Organizations:
May 24, 2014
Dopant-level trojan standard cell developed by Georg Becker and coworkers

Hardware trojan attacks and countermeasures

IC designers are becoming increasingly worried about the possibility of third parties inserting malicious 'trojan' circuitry into their ICs.
January 15, 2012

Virtualization

Virtualization makes it possible to run multiple operating system images on one processor core – with benefits for memory protection, power efficiency and cost reduction.
April 1, 2011
smart3

Home sweet smart home

As part of our utility metering focus, Sean Murphy offers a US perspective on the challenges.
December 14, 2010
low-cost-thumb

Low-cost real-time data delivery for medical devices

Danish life science entrepreneur Medotech needed a way to provide secure and simple access to its Grindcare medical devices deployed on patients’ home networks. This article outlines how Medotech solved the problem using Nabto’s patented off-the-shelf embedded software and describes how the implementation simplifies system maintenance and future development. A further section considers the integration [...]
Article  |  Topics: Embedded - Platforms  |  Tags: ,

PLATINUM SPONSORS

Synopsys Cadence Design Systems Mentor - A Siemens Business
View All Sponsors