“When one has taken root, one puts out branches.” – Jules Verne
What do microprocessors, pine trees, and public libraries all have in common? They have lots of branches. Branch instructions are fundamental to all von Neumann machines, along with arithmetic and logic operations. Without branches – specifically, conditional branches – you can’t really … Read More → "I’d Like to Buy a Hint, Pat"
Did you know that the United States is the world’s biggest target for cybersecurity attacks? According to Ponemon’s 2018 Cost of a Data Breach Study, 38% of the global cyber attacks were aimed at the United States. This study also found that the average … Read More → "Privacy by Design"
It is error only, and not truth, that shrinks from inquiry” – Thomas Paine
Sometimes security is just for show and sometimes it’s the real thing. You can get a retiree to put on a blue uniform and stand outside a suburban bank to provide a bit of security theater. Or you can have a team of armed Navy SEALs infiltrate a … Read More → "CPU Security Gets Hardcore"
In this week’s episode of Fish Fry, we take an in-depth look at software piracy and IP theft with Ted Miracco (CEO – SmartFlow Compliance) and David Locke Hall (Author – Crack99: The Takedown of a $100 Million Chinese Software Pirate). Ted, David, and I discuss the challenges of unlicensed software usage and the what can be done to stem the tide of IP theft. Also this week, we check out … Read More → "Thwarting the Software Piracy and IP Theft Epidemic"
A few weeks ago, we talked about software security, and a question was raised about the reliability of physically unclonable functions, or PUFs. We noted at the time that Intrinsic ID agreed that the issue exists, but that they had a solution that more than compensated. Today we take a look at the whole issue in more detail. Possibly too much detail. Put your wonk hat … Read More → "Must PUFs Degrade Over Time?"