feature article
Subscribe Now

Find Your Security in the Cloud

Sequitur Labs Adds “Trust as a Service”

Sometimes the biggest engineering challenge is overcoming NIH. The dreaded “not invented here” syndrome has derailed many a project, cost untold millions, wasted months, and produced inferior products. NIH is like our own children: it’s hard not to fall in love and overlook the flaws. 

Sometimes what we need is a whack on the head and someone to tell us, “This is not your core competence! Give it up and let an expert do it!” It’s tough love in the engineering lab. 

Nowhere is this more evident than in the category of security. Ten years ago, most of us didn’t care about designing-in security measures. Now it’s a requirement. Yet very few hardware or software developers have any real expertise with security, nor do most of us have any interest in it, either. It’s a necessary evil, not an opportunity to innovate. It’s also a good way to look bad in front of your boss and your peers. If your homegrown security measures somehow work, nobody cares because success was expected. But if your product ever gets hacked, you’re the goat. It’s a lose-lose situation. 

That’s why outsourced security companies exist. Companies like Sequitur Labs, which has long offered its EmSpark package of security measures for embedded and IoT devices. The twelve-person company toils away on security measures because they know nobody else wants to. Now, they’ve augmented their security software with cloud-based services. 

The new EmPower service offers a package of features to remotely manage devices in the field. EmPower handles over-the-air firmware updates, protects sensitive intellectual property, manages keys and certificates, detects threats, and collects interesting data from your devices to monitor their health and welfare. It doesn’t even need the EmSpark software layer to work, though that helps. 

Like EmSpark, EmPower runs on relatively low-end microprocessors from ARM’s Cortex-A range, including chips from NXP, STMicro, Microchip, and (surprisingly) nVidia. Nearly any CPU with ARM’s TrustZone is a potential target. But, unlike EmSpark, EmPower can also run on low-end MCUs that don’t have TrustZone. You won’t get all the same features that the two-product combination can deliver, but it’s better than nothing. 

Sequitur Lab’s VP of Marketing, Larry O’Connell, makes the point that security is (a) necessary, and (b) harder than it looks. It’s tough enough for most programmers to develop, test, and deliver working code that does what it’s supposed to under normal circumstances. Operating smoothly in the face of malicious hacking is exponentially tougher, largely because we don’t even know what we’re fighting against. Do we worry about RF-based side-channel attacks? Code injection? Hidden exploits in the operating system, code libraries, drivers, or hardware? Are production methods really secure, and are firmware updates reliable? The list goes on and on, and most of us are ill equipped to recognize, much less fix, such an array of vulnerabilities. 

Moreover, every processor is different, so nailing down one product design may not help much with the next one. And the threats change over time, too. There’s a reason PC antivirus programs are subscriptions, not one-time purchases. With EmSpark, he says, programmers deal only with its software interface, not with the underlying hardware, so experience transfers from one project to the next. 

Layering EmPower’s cloud services on top of EmSpark adds “entire life cycle management, from initial boot up until the product is removed from service,” says O’Connell. 

If security concerns are going to be with us — and it looks like they will — it makes sense to either develop some in-house expertise or outsource it to someone who already has. Given that most embedded and IoT product developers already have their hands full developing their products, the latter course makes a lot of sense.

One thought on “Find Your Security in the Cloud”

  1. engineers drawn out of their realm of the entirely-predictable to play in the wild world of what is done with the bits do so to their disadvantage

Leave a Reply

featured blogs
Apr 12, 2024
Like any software application or electronic gadget, software updates are crucial for Cadence OrCAD X and Allegro X applications as well. These software updates, often referred to as hotfixes, include support for new features and critical bug fixes made available to the users ...
Apr 11, 2024
See how Achronix used our physical verification tools to accelerate the SoC design and verification flow, boosting chip design productivity w/ cloud-based EDA.The post Achronix Achieves 5X Faster Physical Verification for Full SoC Within Budget with Synopsys Cloud appeared ...
Mar 30, 2024
Join me on a brief stream-of-consciousness tour to see what it's like to live inside (what I laughingly call) my mind...

featured video

How MediaTek Optimizes SI Design with Cadence Optimality Explorer and Clarity 3D Solver

Sponsored by Cadence Design Systems

In the era of 5G/6G communication, signal integrity (SI) design considerations are important in high-speed interface design. MediaTek’s design process usually relies on human intuition, but with Cadence’s Optimality Intelligent System Explorer and Clarity 3D Solver, they’ve increased design productivity by 75X. The Optimality Explorer’s AI technology not only improves productivity, but also provides helpful insights and answers.

Learn how MediaTek uses Cadence tools in SI design

featured chalk talk

Reliable Connections for Rugged Handling
Sponsored by Mouser Electronics and Amphenol
Materials handling is a growing market for electronic designs. In this episode of Chalk Talk, Amelia Dalton and Jordan Grupe from Amphenol Industrial explore the variety of connectivity solutions that Amphenol Industrial offers for materials handling designs. They also examine the DIN charging solutions that Amphenol Industrial offers and the specific applications where these connectors can be a great fit.
Dec 5, 2023
17,004 views