design for security

February 23, 2018

Mentor framework pulls devices into the cloud

With the aim of making it easier for embedded devices to cooperate in an IoT environment, Mentor has launched a cloud connectivity and management framework.
Article  |  Topics: Blog - Embedded  |  Tags: , ,   |  Organizations:
February 21, 2018

Arm to push integrated SIM for secure IoT

Arm plans to use its cryptography cores and technology from its Simulity Labs acquisition to SIM-based security into IoT devices.
Article  |  Topics: Blog - Embedded, IP  |  Tags: , , , ,   |  Organizations:
December 18, 2017

Third time lucky for iKettle security

IoT kettle maker changed its approach to bolster security, the company's CTO explained at the IoTSF conference in London.
Article  |  Topics: Blog - Embedded  |  Tags: ,
November 20, 2017

Maxim uses own PUF for low-cost crypto devices

Maxim has used its own mismatch-based PUF technology to support a new line of low-cost security devices.
Article  |  Topics: Blog - EDA, Embedded  |  Tags: , , ,   |  Organizations:
March 20, 2017

Motion sensors get earache

Attacks using sound can upset accelerometers and make them produce false motion signals.
March 8, 2017

Verification Futures tackles safety and security

The Verification Futures conference organized by European EDA consultancy TV&S returns for its seventh year in early April with a focus on safety and security in the growing area of cyber-physical systems.
Article  |  Topics: Blog - EDA, Embedded  |  Tags: , , , ,   |  Organizations:
March 8, 2017

IoT security seminar heads to US

The NMI's IoT Security Foundation is organizing a seminar on embedded systems security in Silicon Valley at the end of March.
Article  |  Topics: Blog - Embedded  |  Tags: , , ,   |  Organizations:
February 14, 2017

Software brings secure IDs to almost any device

Intrinsic-ID has developed software that allows its PUF technology to be used in most systems that contain static memory together with a framework for managing secure keys in the supply chain.
Article  |  Topics: Blog - Embedded, IP  |  Tags: , , ,
February 3, 2017

Penetration test tools extend reach into embedded devices

The Metasploit collection of tools used by penetration testers to find security flaws in software now has a bridge to deeply embedded hardware devices, developed by analytics company Rapid7.
February 25, 2016

Mentor’s Veloce boasts emulation gains fueled by software

Mentor Graphics is looking to get yet more efficiency from its market-leading Veloce emulator family through an OS upgrade and new task-specific Apps.

PLATINUM SPONSORS

Synopsys Cadence Design Systems Siemens EDA
View All Sponsors