Security
Subscribe Now

A Tale to Make Your Blood Run Cold

For many of us in the Northern Hemisphere it is winter, so a good time to close the curtains, gather round the fire and tell stories that make the blood run cold and the hairs on the back of your neck rise in horror. And this is one such story.

It was a peaceful day in the international company’s computer operations centre until, at 13.07, the monitoring … Read More → "A Tale to Make Your Blood Run Cold"

Policy and Regulations in the IoT World

Watching the tech industry over the last few decades, it’s easy to come to the conclusion that all of the inventions have come solely through the efforts of single-minded entrepreneurs determined to win, even if it means losing in the attempt. While lots of that has happened, this worldview, just like the notion that the Wild West was won solely by rugged individualists with no help from anyone, … Read More → "Policy and Regulations in the IoT World"

The Cat-and-Mouse World of Logic Camouflage

We all know that security (or at least talking about it) is all the rage, although most of that attention relates to software. But hardware too? Yes, hardware too. However, today, we’re not going to talk about hardware that’s providing security to something else; we want to talk about protecting the hardware itself as intellectual property (IP).

Reverse engineering by companies like Read More → "The Cat-and-Mouse World of Logic Camouflage"

Why Blank Slates Don’t Work

This week’s episode of Fish Fry covers the world of embedded design open standards and modules, a new security IC, and the science behind swearing. Jerry Gipper (Executive Director at VITA) joins us to discuss how VITA evolved from a simple VMEbus users group to the unique collaboration between suppliers and users it is today. We’ll discuss the future of VME and VPX technology, and why open … Read More → "Why Blank Slates Don’t Work"

Spectre and Meltdown Continuing Coverage

Spectre and Meltdown are possibly the most important (and interesting) security vulnerabilities discovered in the past two decades. Because they capitalize on weaknesses in commonly-used architectural features in many processors, they span numerous vendors, processors, and just about every type of computing device. Billions of processors deployed over the past two decades could be vulnerable.

The EE Journal editorial team is working to bring you the “engineer’ … Read More → "Spectre and Meltdown Continuing Coverage"

Profiteering from Spectre and Meltdown

OK, I’ve got to say something. Within the past week, I’ve seen numerous examples of companies trying to profiteer from the panic surrounding Spectre and Meltdown – and generating even more panic in the process. In my view, this is unethical and irresponsible. As engineers, this kind of corporate behavior damages public trust in our profession, in our work, and in us personally. We have to do all … Read More → "Profiteering from Spectre and Meltdown"

February 15, 2018
February 8, 2018
January 9, 2018
January 2, 2018
December 7, 2017
November 30, 2017
November 27, 2017
November 20, 2017
October 17, 2017
October 3, 2017
September 28, 2017
September 27, 2017
September 26, 2017
September 21, 2017
featured blogs
Feb 23, 2018
The IEEE-SA has a policy of keeping standards active by making sure they get a cycle of updates every 10 years. Including Verilog, SystemVerilog has been going on a cycle of updates every 5±1 years since 1995. I wrote here about the updates to 1800-2009 and 1800-2012, and no...
Feb 23, 2018
What is a software GPS, what does it have to do with Tensilica DSP IP, and why would anyone care? To answer that, let's start with a quiz from the transportation industry. How many shipping containers are currently in transit around the world? It turns out that no one kn...
Feb 22, 2018
We’ve spent a good chunk of the last year building a new on-site search experience for Samtec.com. This update continues that trend with our newly released competitor cross reference search addition. Using this feature, you can access competitor cross reference data for...
Jan 19, 2018
Artificial intelligence (AI) is reshaping the way the world works, opening up countless opportunities in commercial and industrial systems. Applications span diverse markets such as autonomous driving, medical diagnostics, home appliances, industrial automation, adaptive webs...
chalk talks
Security ICs Deliver a Stronger Level of Protection   Physically unclonable functions (PUFs) are like fingerprints for semiconductor devices. And, for security applications, PUFs are an outstanding, secure way to uniquely identify an individual device. In this episode of Chalk Talk, Amelia Dalton chats with Scott Jones from Maxim Integrated about physically unclonable functions, and how you can use them to secure … Read More → "Security ICs Deliver a Stronger Level of Protection"
MAXQ1061: A Turnkey Solution for Embedded Systems SecuritySecurity should NOT be an afterthought in your embedded designs. It’s important to have a well-conceived security strategy implemented from the top down. in this episode of Chalk Talk, Amelia Dalton chats with Reza Ahmadi of Maxim Integrated about the MAXQ1061 turnkey solution for embedded systems security. It’ll help you sleep better at night. Click … Read More → "MAXQ1061: A Turnkey Solution for Embedded Systems Security"