Tech Design Forums
Technique
embedded security
embedded security
All
(2)
Articles
(2)
October 9, 2018
Using threat models and risk assessments to define device security requirements
The proliferation of attacks against embedded systems is making designers realize that they need to do more to secure their products and ecosystems.
Article | Topics:
Embedded - Architecture & Design
,
IP - Selection
| Tags:
attack
,
embedded security
,
IoT security
,
threat model
| Organizations:
Synopsys
November 6, 2017
Fighting the war of escalation in embedded systems security
The challenge for designers is to find ways of providing high levels of security in low-cost devices that have become worthwhile targets because of their role as gateways to more valuable information.
Expert Insight | Topics:
Embedded - Architecture & Design
,
IP - Selection
| Tags:
cryptography
,
embedded security
,
IoT
| Organizations:
Synopsys
IP Topics
Assembly & Integration
Design Management
Selection
PLATINUM SPONSORS
View All Sponsors
twitter
facebook
RSS
Tech Design Forum
Log In
Register
Sponsors
Briefing
EDA
EDA TOPICS
DFM
DFT
ESL
IC Implementation
Verification
MORE EDA
Expert Insights
Guides
EDA Home Page
IP
IP TOPICS
Assembly & Integration
Design Management
Selection
MORE IP
Expert Insights
Guides
IP Home Page
PCB
PCB TOPICS
Design Integrity
Layout & Routing
System Codesign
MORE PCB
Expert Insights
Guides
PCB Home Page
Embedded
EMBEDDED TOPICS
Architecture & Design
Integration & Debug
Platforms
User Experience
MORE EMBEDDED
Expert Insights
Guides
Embedded Home Page
Search