Tech Design Forums
Technique
IoT security
IoT security
All
(2)
Articles
(2)
October 9, 2018
Using threat models and risk assessments to define device security requirements
The proliferation of attacks against embedded systems is making designers realize that they need to do more to secure their products and ecosystems.
Article | Topics:
Embedded - Architecture & Design
,
IP - Selection
| Tags:
attack
,
embedded security
,
IoT security
,
threat model
| Organizations:
Synopsys
November 24, 2015
Taking an end-to-end approach to IoT security
Achieving IoT security means addressing every link in the chain, from the quality of your application code to embedding a root of trust in the hardware.
Expert Insight | Topics:
Embedded - Architecture & Design
,
IP - Selection
| Tags:
code quality
,
cryptography
,
internet of things
,
IoT
,
IoT security
,
root of trust
,
secure IP
,
security
| Organizations:
Synopsys
IP Topics
Assembly & Integration
Design Management
Selection
PLATINUM SPONSORS
View All Sponsors
twitter
facebook
RSS
Tech Design Forum
Log In
Register
Sponsors
Briefing
EDA
EDA TOPICS
DFM
DFT
ESL
IC Implementation
Verification
MORE EDA
Expert Insights
Guides
EDA Home Page
IP
IP TOPICS
Assembly & Integration
Design Management
Selection
MORE IP
Expert Insights
Guides
IP Home Page
PCB
PCB TOPICS
Design Integrity
Layout & Routing
System Codesign
MORE PCB
Expert Insights
Guides
PCB Home Page
Embedded
EMBEDDED TOPICS
Architecture & Design
Integration & Debug
Platforms
User Experience
MORE EMBEDDED
Expert Insights
Guides
Embedded Home Page
Search