Security
Subscribe Now

A Tale to Make Your Blood Run Cold

For many of us in the Northern Hemisphere it is winter, so a good time to close the curtains, gather round the fire and tell stories that make the blood run cold and the hairs on the back of your neck rise in horror. And this is one such story.

It was a peaceful day in the international company’s computer operations centre until, at 13.07, the monitoring … Read More → "A Tale to Make Your Blood Run Cold"

Policy and Regulations in the IoT World

Watching the tech industry over the last few decades, it’s easy to come to the conclusion that all of the inventions have come solely through the efforts of single-minded entrepreneurs determined to win, even if it means losing in the attempt. While lots of that has happened, this worldview, just like the notion that the Wild West was won solely by rugged individualists with no help from anyone, … Read More → "Policy and Regulations in the IoT World"

The Cat-and-Mouse World of Logic Camouflage

We all know that security (or at least talking about it) is all the rage, although most of that attention relates to software. But hardware too? Yes, hardware too. However, today, we’re not going to talk about hardware that’s providing security to something else; we want to talk about protecting the hardware itself as intellectual property (IP).

Reverse engineering by companies like Read More → "The Cat-and-Mouse World of Logic Camouflage"

Why Blank Slates Don’t Work

This week’s episode of Fish Fry covers the world of embedded design open standards and modules, a new security IC, and the science behind swearing. Jerry Gipper (Executive Director at VITA) joins us to discuss how VITA evolved from a simple VMEbus users group to the unique collaboration between suppliers and users it is today. We’ll discuss the future of VME and VPX technology, and why open … Read More → "Why Blank Slates Don’t Work"

Spectre and Meltdown Continuing Coverage

Spectre and Meltdown are possibly the most important (and interesting) security vulnerabilities discovered in the past two decades. Because they capitalize on weaknesses in commonly-used architectural features in many processors, they span numerous vendors, processors, and just about every type of computing device. Billions of processors deployed over the past two decades could be vulnerable.

The EE Journal editorial team is working to bring you the “engineer’ … Read More → "Spectre and Meltdown Continuing Coverage"

Profiteering from Spectre and Meltdown

OK, I’ve got to say something. Within the past week, I’ve seen numerous examples of companies trying to profiteer from the panic surrounding Spectre and Meltdown – and generating even more panic in the process. In my view, this is unethical and irresponsible. As engineers, this kind of corporate behavior damages public trust in our profession, in our work, and in us personally. We have to do all … Read More → "Profiteering from Spectre and Meltdown"

April 18, 2018
April 12, 2018
April 4, 2018
March 21, 2018
March 19, 2018
March 8, 2018
March 5, 2018
March 2, 2018
February 26, 2018
February 15, 2018
February 8, 2018
January 9, 2018
January 2, 2018
December 7, 2017
November 30, 2017
November 27, 2017
November 20, 2017
October 17, 2017
October 3, 2017
September 28, 2017
September 27, 2017
featured blogs
Apr 18, 2018
Standardization. COTS. Interoperability. Configurable. These often-used terms describe on-going efforts to define flexible and open critical embedded computing architectures. One such example is VITA-backed VPX. The goal of VPX is to leverage the latest switch fabric technolo...
Apr 18, 2018
Recently, the ESD Alliance organized the annual CEO Outlook panel with Simon, Wally, Grant and Dean. I covered the opening statements yesterday , but I figured it would get too long to put everything into a single post, so here's the rest of the evening. There's a b...
chalk talks
Security ICs Deliver a Stronger Level of Protection   Physically unclonable functions (PUFs) are like fingerprints for semiconductor devices. And, for security applications, PUFs are an outstanding, secure way to uniquely identify an individual device. In this episode of Chalk Talk, Amelia Dalton chats with Scott Jones from Maxim Integrated about physically unclonable functions, and how you can use them to secure … Read More → "Security ICs Deliver a Stronger Level of Protection"
MAXQ1061: A Turnkey Solution for Embedded Systems SecuritySecurity should NOT be an afterthought in your embedded designs. It’s important to have a well-conceived security strategy implemented from the top down. in this episode of Chalk Talk, Amelia Dalton chats with Reza Ahmadi of Maxim Integrated about the MAXQ1061 turnkey solution for embedded systems security. It’ll help you sleep better at night. Click … Read More → "MAXQ1061: A Turnkey Solution for Embedded Systems Security"