If we thought about verfication-for-security in a different way, the Spectre and Meltdown vulnerabilities could well have been avoided.
The assumption has been that extra security eats into profit margins. But with some lateral thinking it can actually improve the bottom line.
This second part looks at Mentor's views on flow neutrality, how DRS360 was born, machine learning and the threat from embedded Trojans.
When developing its security guidelines and checklists for consumer IoT and similar devices, the IoT Security Foundation's working groups tested their recommendations against what is known about real-world hacks and attacks.
Achieving IoT security means addressing every link in the chain, from the quality of your application code to embedding a root of trust in the hardware.
Designers will have to update development processes to achieve the rigorous safety certifications required in automotive, rail, avionics and similar markets
IC designers are becoming increasingly worried about the possibility of third parties inserting malicious 'trojan' circuitry into their ICs.
Virtualization makes it possible to run multiple operating system images on one processor core – with benefits for memory protection, power efficiency and cost reduction.
As part of our utility metering focus, Sean Murphy offers a US perspective on the challenges.
Danish life science entrepreneur Medotech needed a way to provide secure and simple access to its Grindcare medical devices deployed on patients’ home networks. This article outlines how Medotech solved the problem using Nabto’s patented off-the-shelf embedded software and describes how the implementation simplifies system maintenance and future development. A further section considers the integration [...]
View All Sponsors