security

October 25, 2016

ARM brings security to Cortex-M family

ARM has launched the first of a series of Cortex-M series microcontrollers based on the V8M architecture that incorporate the Trustzone security mechanism.
Article  |  Topics: Blog - Embedded, IP  |  Tags: , , , ,   |  Organizations:
May 25, 2016

ECC crypto code and core aim for home automation

Oberon Microsystems has ported a set of low-overhead cryptographic codes suitable for Apple's HomeKit to the Cortus APS3RP 32bit processor core.
Article  |  Topics: Blog - Embedded, IP  |  Tags: , , , ,   |  Organizations:
February 25, 2016

Security focus for Embedded World

Security took center stage at the Embedded World show in N├╝rnberg this week, with a number of vendors launching software intended to help protect against hacks.
Article  |  Topics: Blog - Embedded  |  Tags: , , ,   |  Organizations:
February 22, 2016

DVCon United States 2016 preview: Mentor Graphics

Mentor Graphics chairman and CEO Wally Rhines will deliver the DVCon keynote as the vendor sets a deep agenda for the conference.
January 8, 2016

Prpl Foundation proposes security architecture

The Prpl Foundation has published a guide to techniques it claims will improve the security of embedded systems.
December 10, 2015

Cortus adds hardware floating point to low-area processor family

Cortus has added to its version 2 architecture a processor core that offers hardware support for floating-point code.
Article  |  Topics: Blog - Embedded, IP  |  Tags: , , , , , ,   |  Organizations:
December 1, 2015

Ultrasoc tweaks debug technology to act as SoC burglar alarm

Ultrasoc is adding security monitoring to its toolkit, providing SoC designers with a mechanism for their chips to warn of attempts by hackers to break into secure areas.
Article  |  Topics: Blog - Embedded, IP  |  Tags: , , ,   |  Organizations:
November 10, 2015

ARM ports Trustzone down to Cortex-M

ARM is bringing the Trustzone security architecture to future Cortex-M processor cores, combining that with a version of AHB that will recognise the difference between secure and non-secure transactions.
Article  |  Topics: Blog - IP  |  Tags: , , , , ,   |  Organizations:
May 13, 2015

ARM calls for Internet Protocol to the edge in security play

ARM CTO Mike Muller called for IP to be used throughout the IoT as part of a strategy for secure systems at a recent NMI seminar at Bletchley Park, England.
Article  |  Topics: Blog - Embedded  |  Tags: , , , ,   |  Organizations:
April 9, 2015

Mentor’s 2015 Valley User2User is less than two weeks away

IoT-themed keynotes from Mentor's Wally Rhines and Qualcomm's Karim Arabi headline vendor's User2User conference on April 21.

PLATINUM SPONSORS

Synopsys Cadence Design Systems Siemens EDA
View All Sponsors