security

October 29, 2020

Implementing medical device security for optimal outcomes

Describing a security strategy that pulls on best practices and standards to ensure medical device approval and the best patient outcomes.
Expert Insight  |  Topics: Embedded - Architecture & Design, - Embedded Topics  |  Tags: , , , ,   |  Organizations:
April 30, 2020
Scot Morrison Mentor

Delivering on security for Linux-based medical devices

How should you address the monitoring and resource challenges in maintaining security for Linux devices.
September 3, 2019

Ensuring system-level security of complex SoCs

Using a hardware root of trust and a secure development lifecycle process to form the basis of a better approach to developing and implementing more secure complex SoCs.
July 4, 2019
Ashish Darbari is CEO of formal verification consultancy Axiomise.

A new formal proof kit for RISC-V processors

Doc Formal describes a strategy developed by his company Axiomise to apply formal verification proofs to open-source processor for safety, security and reliability.
Expert Insight  |  Topics: EDA - Verification  |  Tags: , , , , ,
March 26, 2019

High-level synthesis for AI: Part One

The computational and algorithmic demands made by computer vision systems highlight HLS' value for AI system development.
January 26, 2018
Ashish Darbari is CEO of formal verification consultancy Axiomise.

Doc Formal: When ‘silicon proven’ is not enough

If we thought about verfication-for-security in a different way, the Spectre and Meltdown vulnerabilities could well have been avoided.
Expert Insight  |  Topics: EDA - Verification  |  Tags: , , , , , ,   |  Organizations:
October 14, 2017
Michael Chen is Director, Design for Security, in the New Ventures Division of Mentor, a Siemens Business.

Making security a profit center for silicon

The assumption has been that extra security eats into profit margins. But with some lateral thinking it can actually improve the bottom line.
May 15, 2017
Dr Walden Rhines is Chairman and CEO of Mentor - A Siemens Business

The Wally Rhines interview – Part Two: AI, automotive and security

This second part looks at Mentor's views on flow neutrality, how DRS360 was born, machine learning and the threat from embedded Trojans.
December 14, 2016
IoTSF eye on security image

Guidelines attempt to build trust in IoT

When developing its security guidelines and checklists for consumer IoT and similar devices, the IoT Security Foundation's working groups tested their recommendations against what is known about real-world hacks and attacks.
Article  |  Topics: Embedded - Architecture & Design, User Experience  |  Tags: , , ,   |  Organizations:
November 24, 2015
Angela Raucher is product line manager for Synopsys’ ARC EM processors.

Taking an end-to-end approach to IoT security

Achieving IoT security means addressing every link in the chain, from the quality of your application code to embedding a root of trust in the hardware.

PLATINUM SPONSORS

Synopsys Cadence Design Systems Siemens EDA
View All Sponsors