fish fry
Subscribe Now

Fish Fry 500: The Best of Security (Now on YouTube!)

In anticipation of the 500th episode of Amelia’s Weekly Fish Fry (and the upcoming launch of Fish Fry on Youtube!), we are highlighting playlists of episodes cultivated from years of podcastin’ fun!  Subscribe to the EE Journal YouTube channel to catch them all. 

We are three weeks away from the 500th episode of Amelia’s Weekly Fish Fry. This week, we highlight one of the most important topics in all of electronic engineering: security. In this series, I investigate a variety of critical security concerns including the role software fluency plays in automotive security, why software protection is more important than ever before, and the ethical nature of embedded security. 

 

Taking Piracy Out of the Driver’s Seat

In this Fish Fry podcast, Ted Miracco (CEO – Cylynt) and I discuss the increased prevalence of software piracy in the automotive industry and what can be done to stem the tide of unauthorized software use today. We also discuss the current state of cybersecurity and the details of their Cylynt Connect Software Monetization and Anti-Piracy Summit.

 

The Hidden Security Risks of Automotive Electronic Systems

What comes to mind when you think of an automotive energy source? I’m guessing of all the things you could possibly imagine tamarind shells wouldn’t be one of them… but maybe they should be. In this episode, I take a closer look at a multi-national research study that could pave ways to supply energy to cars. (Spoiler Alert: It involves creating carbon nanosheets from tamarind shells!) Keeping with our vehicular theme, Adrian Cosoroaba (Winbond) joins me to discuss the hidden security risks of automotive electronic systems.

 

The Future of Connected Cars: Automotive Cybersecurity and Software Fluency with C2A Security

We are navigating through the twists and turns of automotive security in this Fish Fry podcast. Michael Dick (CEO – C2A Security) joins me for an in-depth discussion about the role software fluency plays in the realm of automotive security, the ongoing issues surrounding cybersecurity lifecycle management, and why Mike believes that without visibility we cannot have security.

 

Cylynt and Stealthy: Curbing Piracy and Creating a Quantum Internet

It’s a bird, it’s a plane, its quantum internet…? In this Fish Fry podcast, we start things off with an exploration into the US Government’s plans for a country-wide quantum internet. We investigate the roles quantum entanglement and quantum superposition will play in the future of a quantum internet and what steps will need to be taken to make this kind of unhackable internet a reality. Ted Miracco (Cylynt) also joins me to discuss why the fight against IP theft is nowhere near done, why SmartFlow Compliance Solutions is now Cylynt, and why software protection is more important than ever before.

 

Better Hints and Less Misses: A New Holistic Approach to Hardware-Based SoC/ASIC Cybersecurity

In this podcast we have a bubbling virtual witches brew of electronic engineering creativity that is one part analog, three parts IP, with a big ol’ heap full of intelligent decision making. Gajinder Panesar (UltraSoC) and Tim Ramsdale (Agile Analog) join me to discuss what UltraSoC’s digital monitoring ecosystem IP is all about, the changing role of analog IP in the world of cybersecurity, and why this collaboration between UltraSoC and Agile Analog will help enable a holistic approach to hardware-based SoC/ASIC cybersecurity.

 

Adventures in Satellite Security and The SpaceX Comfy Ride to the Moon

In this podcast, we’ve got our eyes trained on the glittering skies. First up, we take a closer look at the spacecraft user manual for Starship, a next-generation launch vehicle currently being developed by SpaceX. We check out how Starship is going to be used, the details of its high-capacity the cargo hauler, and how Starship is going to get us to the moon in high-flying style. Also this week, we chat with Richard Jaenicke (Green Hills Software) about satellite security and vulnerability, how satellites can be hacked, and what solutions we need to implement at in order keep our satellites safely in orbit.

 

Security from the Ground Up: Automotive Coding Standards and the Power of Testing

“It takes 8,460 bolts to assemble an automobile, and one nut to scatter it all over the road.” – Author Unknown

Hello, my name is Amelia and I have read at least four hundred press releases about automotive design this week. It seems that the 2019 Consumer Electronics Show has been taken over by automotive design. But behind the pomp and sparkle of CES lies the important stuff – the software that keeps us safe and secure. In this episode of Fish Fry, my first guest Jim McElroy (LDRA) and I chat about security vulnerability prevention, automotive coding standards, and the power of verification automation. Bill Lamie (Express Logic) also joins me to discuss challenges of standard compliance in the IoT space and how Express Logic’s X-Ware IoT platform can help your next IoT design security from the RTOS on up.

 

Privacy by Design: IoT and Challenges of Cybersecurity Today

In this episode of Fish Fry, my guest Cynthia Wright (Principal Cybersecurity Engineer at the MITRE Corporation) and I talk about the many layers of cybersecurity in IoT, what “The Weaponization of Everything” is all about, and why privacy by design, security by design and resiliency by design will play a vital part in the future of Internet of Things.

 

Security in Action: The Barr Group Lays Out a Secure Path to the Future

“There are risks and costs to action. But they are far less than the long range risks of comfortable inaction.” – John F. Kennedy

In this episode of Fish Fry, I reach down deep into your embedded system code to find exactly where your security measures have fallen short. Andrew Girson (The Barr Group) joins me to discuss the ethical nature of embedded security, the specifics of The Barr Group’s security action plan and why you should check out their book,  Embedded C Coding Standard.

 

Security by Obscurity No Longer: WikiLeaks and the Future of IoT Security

You will not see it coming. When your back is turned, it will rise up behind you. When it hits, without question, it’s taking you down with it. In nature, it’s called a sneaker wave. In the world of EE, it’s called a security attack. In this week’s Fish Fry, we take a closer look at the ramifications of the recent WikiLeaks IoT security breach documents with Icon Labs CEO Alan Grau. Alan and I investigate the issues surrounding security in legacy IoT devices, and the hardware and software solutions we should explore as engineers in our IoT designs. Keeping with our IoT theme, we also check out a hilarious announcement from ByteSnap Designs and a new wearable development from ON Semiconductor.

Leave a Reply

featured blogs
Oct 6, 2022
The days of 'throwing it over the wall' are over. Heterogeneous integration is ushering in a new era of silicon chip design with collaboration at its core'”one that lives or dies on seamless interaction between your analog and digital IC and package design teams. Heterogeneo...
Oct 4, 2022
We share 6 key advantages of cloud-based IC hardware design tools, including enhanced scalability, security, and access to AI-enabled EDA tools. The post 6 Reasons to Leverage IC Hardware Development in the Cloud appeared first on From Silicon To Software....
Sep 30, 2022
When I wrote my book 'Bebop to the Boolean Boogie,' it was certainly not my intention to lead 6-year-old boys astray....

featured video

PCIe Gen5 x16 Running on the Achronix VectorPath Accelerator Card

Sponsored by Achronix

In this demo, Achronix engineers show the VectorPath Accelerator Card successfully linking up to a PCIe Gen5 x16 host and write data to and read data from GDDR6 memory. The VectorPath accelerator card featuring the Speedster7t FPGA is one of the first FPGAs that can natively support this interface within its PCIe subsystem. Speedster7t FPGAs offer a revolutionary new architecture that Achronix developed to address the highest performance data acceleration challenges.

Click here for more information about the VectorPath Accelerator Card

featured paper

Algorithm Verification with FPGAs and ASICs

Sponsored by MathWorks

Developing new FPGA and ASIC designs involves implementing new algorithms, which presents challenges for verification for algorithm developers, hardware designers, and verification engineers. This eBook explores different aspects of hardware design verification and how you can use MATLAB and Simulink to reduce development effort and improve the quality of end products.

Click here to read more

featured chalk talk

Clamping Down on Failure: Protecting 24 V Digital Outputs

Sponsored by Mouser Electronics and Skyworks

If you're designing IEC61131 compliant digital outputs for these PLCs or industrial controllers, you need to have a plan to protect these outputs from a variety of unknowns. In this episode of Chalk Talk, Amelia Dalton chats with Asa Kirby from Skyworks about an innovative new isolated smart switch device from Skyworks that gives you an unprecedented level of channel flexibility and protection, letting you offer customers a truly “set it and forget it” solution when it comes to your next PLC design.

Click here for more information about Skyworks Solutions Inc. Si834x Isolated Smart Switches