hacking


June 6, 2024

Real Intent tool looks at paths to hardware vulnerability

Real Intent has developed a tool for identifying potential security issues in chip designs at the sign-off stage.
Article  |  Topics: Blog - EDA  |  Tags: , ,   |  Organizations:
July 11, 2022

Fault simulator tackles intrusive hacks

Optima DA has turned its high-throughput fault-simulation technology to the checking protections against aggressive, intrusive hacks.
Article  |  Topics: Blog - EDA  |  Tags: , , , ,   |  Organizations:
April 16, 2020

IP partnership aims to crack down on physical hacks

UltraSoC and Agile Analog have teamed up to build an infrastructure that can help guard against physical attacks on SoCs.
Article  |  Topics: Blog - IP  |  Tags: , , ,   |  Organizations: ,
September 27, 2019

Accellera adds detail to proposed security assurance model

Accellera's security assurance working group has set out some of its plans in a white paper.
Article  |  Topics: Blog - IP  |  Tags: , ,   |  Organizations:
June 4, 2019

The unknown unknowns of secure devices

Developing a security assurance standard for IP faces numerous problems but Accellera working-group members are trying to find an answer.
May 2, 2018

Arm adds tamper resistance to M-series core

Arm aims to bring protection against physical tampering and side-channel attacks into processor cores designed for IoT nodes, starting with one of its M-series designs.
Article  |  Topics: Blog - IP  |  Tags: , , ,   |  Organizations:
April 20, 2015

Leakage analysis checks IP cores against crypto vulnerability

The Athena Group says it has developed countermeasures against side-channel attacks for its IP that offer the best protection currently available.
Article  |  Topics: Blog - IP  |  Tags: , , ,   |  Organizations: ,
June 7, 2014

Intel’s security architect lays out protection plan

At DAC 2014, Intel’s chief security architect Ernie Brickell described the processor maker’s approach to protecting hardware and software from hacks and attacks.
Article  |  Topics: Blog - EDA, Embedded  |  Tags: , , , , ,   |  Organizations:
May 29, 2014

Do not trust the cores, Trojans

If someone put a piece of RTL into your SoC designed to leak information to the outside world, or simply kill the device stone dead, could you spot it?
Article  |  Topics: Blog - EDA, Embedded  |  Tags: , , , ,

PLATINUM SPONSORS

Synopsys Cadence Design Systems Siemens EDA
View All Sponsors