side-channel analysis


July 11, 2022

Fault simulator tackles intrusive hacks

Optima DA has turned its high-throughput fault-simulation technology to the checking protections against aggressive, intrusive hacks.
Article  |  Topics: Blog - EDA  |  Tags: , , , ,   |  Organizations:
December 18, 2020

Backside metal defends against IR drop and side-channel attacks

Work presented at IEDM 2020 shows taking advantage of the IC backside for power and ground for the additional area can deliver further benefits for IR drop and security.
March 24, 2020

Feed fake news to hardware hackers

Intel describes active countermeasures for physical attacks at CICC as part of a trend towards more adaptive IoT silicon.
Article  |  Topics: Blog - EDA  |  Tags: , , ,   |  Organizations:
June 4, 2019

The unknown unknowns of secure devices

Developing a security assurance standard for IP faces numerous problems but Accellera working-group members are trying to find an answer.
December 22, 2016

Webinar discusses SoC security, area, and power trade-offs

SoC security strategies, costs and trade-offs are analysed in this detailed webinar.
Article  |  Topics: Blog - IP  |  Tags: , ,   |  Organizations:
September 12, 2016

Synopsys adds ultra-low power security processor IP

Ultra-low power security processor IP includes defences against side-channel attacks, data and instruction encryption, DSP options for sensor processing and more.
Article  |  Topics: Blog - IP, - Product  |  Tags: , , ,   |  Organizations:
May 19, 2015

Tortuga introduces security checks for SoC designs

Startup Tortuga Logic has developed a toolkit for checking the security aspects of SoC hardware designs.
Article  |  Topics: Blog - EDA, IP  |  Tags: ,   |  Organizations:
April 21, 2015

Are you ready for design for crime?

Designers will need to take crime into account as part of their design signoff process, Wally Rhines argued in his keynote at Mentor Graphics' U2U San Jose 2015 conference.
Article  |  Topics: Blog - EDA, IP  |  Tags: , , , ,   |  Organizations:
April 20, 2015

Leakage analysis checks IP cores against crypto vulnerability

The Athena Group says it has developed countermeasures against side-channel attacks for its IP that offer the best protection currently available.
Article  |  Topics: Blog - IP  |  Tags: , , ,   |  Organizations: ,
February 24, 2014

MIPS brings virtualization and tamper protection to 32bit MCUs

Imagination Technologies' MIPS group has launched processor cores that include support for virtualization and measures to prevent reverse engineering.

PLATINUM SPONSORS

Synopsys Cadence Design Systems Siemens EDA
View All Sponsors