skip to Main Content

Securing processors for IoT edge nodes

By Angela Raucher, product line manager for ARC EM processors, Synopsys As more IoT devices are deployed, security is growing in importance. Security can be a scary topic on many levels. For example, news of someone hacking a baby monitor is…

IC Industry Waking Up To Security

More companies recognize cybersecurity needs to be built-in from the beginning. JUNE 2ND, 2016 - By Jeff Dorsch & Ed Sperling Many people pay lip service to the concept of security in Internet of Things devices, software, and networks. That…

Visit Synopsys at Mobile World Congress (and see the PUF demo)

Meet with Synopsys at Mobile Word Congress to learn about the latest the developments in DesignWare® IP. Read full announcement at: Synopsys Link Come see the demos: Efficiently Implementing Security Functions for Low-Power IoT Edge Devices Authentication and the privacy and security of sensitive…

Keeping Your IoT Secrets Secret

Ways to Protect Your Keys From Electronic Engineering Journal, by Bryon Moyer [Editor’s note: this is the sixth in a series on Internet-of-Things security. You can find the introductory piece here and the prior piece here.] We’ve looked at how…

Circumventing Cryptography’s Achilles’ Heel

In the wake of the IoT, new approaches to security, including Physically Unclonable Functions, are called for. All modern digital security systems are based on cryptographic algorithms. Cryptographic algorithms scramble data, turn it into gibberish, then unscramble it later, for…

Back To Top