editor's blog
Subscribe Now

Firewalls Everywhere

We recently heard Netronome’s view on next-generation firewalls, and in particular, how they are migrating from the more traditional boundary protection to be distributed throughout compute farms on each rack.

Well, it goes beyond that, at least in Icon Labs’ view; I talked with them at ESC (or Design West, or ESC, a subsidiary of Design West). They point out the fact that embedded systems are all becoming hackable, with a few interesting examples:

–          Apparently if you send the right text message to the right phone number, you can defeat a car’s anti-theft mechanism and drive off with it. (“Dude, where’s my car??” “Oops, sorry, wrong number…”)

–          If you hack a printer, you can steal the images stored in memory.

–          Pacemakers have been successfully hacked in the lab.

So they see small, embeddable firewalls as critical to closing off these unexpected intrusions.  They need to be incorporated at the lowest possible levels in communications stacks, and they need to be worked into safety-critical standards. From a size standpoint, we are talking small: they target Zilog 8-bit MCUs, with 10-12K of ROM and 40K of RAM.

Whoever would have thought that 8-bit MCUs would be running firewalls…

Leave a Reply

featured blogs
Jan 27, 2021
Why is my poor old noggin filled with thoughts of roaming with my friends through a post-apocalyptic dystopian metropolis ? Well, I'€™m glad you asked......
Jan 27, 2021
Here at the Cadence Academic Network, it is always important to highlight the great work being done by professors, and academia as a whole. Now that AWR software solutions is a part of Cadence, we... [[ Click on the title to access the full blog on the Cadence Community site...
Jan 27, 2021
Super-size. Add-on. Extra. More. We see terms like these a lot, whether at the drive through or shopping online. There'€™s always something else you can add to your order or put in your cart '€“ and usually at an additional cost. Fairly certain at this point most of us kn...
Jan 27, 2021
Cloud computing security starts at hyperscale data centers; learn how embedded IDE modules protect data across interfaces including PCIe 5.0 and CXL 2.0. The post Keeping Hyperscale Data Centers Safe from Security Threats appeared first on From Silicon To Software....

featured paper

Common Design Pitfalls When Designing With Hall 2D Sensors And How To Avoid Them

Sponsored by Texas Instruments

This article discusses three widespread application issues in industrial and automotive end equipment – rotary encoding, in-plane magnetic sensing, and safety-critical – that can be solved more efficiently using devices with new features and higher performance. We will discuss in which end products these applications can be found and also provide a comparison with our traditional digital Hall-effect sensors showing how the new releases complement our existing portfolio.

Click here to download the whitepaper

featured chalk talk

Accelerating Physical Verification Productivity

Sponsored by Synopsys

Physical verification of IC designs at today’s advanced process nodes requires an immense amount of processing power. But, getting your design and verification tools to take full advantage of the compute resources available can be a challenge. In this episode of Chalk Talk, Amelia Dalton chats with Manoz Palaparthi of Synopsys about dramatically improving the performance of your physical verification process. 

Click here for more information about Physical Verification using IC Validator