May 6, 2015
Designers will have to update development processes to achieve the rigorous safety certifications required in automotive, rail, avionics and similar markets
May 24, 2014
IC designers are becoming increasingly worried about the possibility of third parties inserting malicious 'trojan' circuitry into their ICs.
January 15, 2012
Virtualization makes it possible to run multiple operating system images on one processor core – with benefits for memory protection, power efficiency and cost reduction.
April 1, 2011
As part of our utility metering focus, Sean Murphy offers a US perspective on the challenges.
December 14, 2010
Danish life science entrepreneur Medotech needed a way to provide secure and simple access to its Grindcare medical devices deployed on patients’ home networks. This article outlines how Medotech solved the problem using Nabto’s patented off-the-shelf embedded software and describes how the implementation simplifies system maintenance and future development. A further section considers the integration [...]
April 15, 2010
The increasing use of electronics systems in today’s cars, trucks and other vehicles inevitably presents a new set of security challenges. Primarily for safety reasons but also for commercial ones, the components used in automotive systems must be extremely resistant to malicious attacks. There are essentially two domains for in-vehicle security: ‘inter-vehicle’ and ‘intra-vehicle’ or, [...]