security

April 9, 2015

Mentor’s 2015 Valley User2User is less than two weeks away

IoT-themed keynotes from Mentor's Wally Rhines and Qualcomm's Karim Arabi headline vendor's User2User conference on April 21.
March 24, 2015

DAC 52 keynotes focus on body-worn electronics and vehicle design

The 2015 Design Automation Conference in San Francisco will feature keynotes that focus on body-worn electronics such as Google’s Smart Contact Lens and automotive issues.
Article  |  Topics: Blog - EDA, Embedded  |  Tags: , , , ,
February 26, 2015

Embedded world wakes up to security

Unsettled by attacks on embedded devices such as the point-of-sale terminals used by retailers such as Target and the potential for hackers to target critical infrastructure, the industry focused squarely on security at this year’s Embedded World in Nürnberg, Germany.
February 24, 2015

HCC adds web, mail, time services to ‘reliable’ network stack and extends flash support

HCC Embedded has extended the TCP/IP stack the company wrote using MISRA rules and formalized V-model processes to include web server, mail, time, and network management protocols.
February 9, 2015

Mentor extends industrial embedded offering

New portfolio integrates and extends existing industrial embedded tools to meet the demands of Industry 4.0
October 7, 2014

Minimal 32bit IP cores tackle connected devices market

Minimal IP cores are meant to serve broader market than IoT, using revised instruction set to increase code density, save on chip memory and enable security
Article  |  Topics: Blog - IP  |  Tags: , , , , ,   |  Organizations:
October 5, 2014

Software firewall demo provides shield against malware

A demo at ARM TechCon showed one way malware could be foiled on systems that run software of uncertain provenance.
Article  |  Topics: Blog - Embedded  |  Tags: , , ,   |  Organizations: ,
October 2, 2014

Software encryption manager aims to tighten up on embedded security

HCC Embedded has developed a modular software manager for encryption, designed to provide embedded systems with the foundation for handling security algorithms.
June 7, 2014

Intel’s security architect lays out protection plan

At DAC 2014, Intel’s chief security architect Ernie Brickell described the processor maker’s approach to protecting hardware and software from hacks and attacks.
Article  |  Topics: Blog - EDA, Embedded  |  Tags: , , , , ,   |  Organizations:
May 29, 2014

Do not trust the cores, Trojans

If someone put a piece of RTL into your SoC designed to leak information to the outside world, or simply kill the device stone dead, could you spot it?
Article  |  Topics: Blog - EDA, Embedded  |  Tags: , , , ,

PLATINUM SPONSORS

Synopsys Cadence Design Systems Siemens EDA
View All Sponsors