skip to Main Content
Hacker

Secure Boot on Steroids

One of the biggest threats to the internet of things (IoT) is the installation of malicious software (malware) on IoT devices that changes the behavior of these devices to facilitate very specific attacks. This malware is often the first step…

Root of Trust Integration

OpenTitan: Transparency Leads to Greater Security

The statement in the title may seem counter-intuitive – aren’t most security systems based on propriety secrets? Yes, they are. These secrets are the cryptographic root keys on which the security of a system is built. However, this does not…

NISTLogo

CAVP – NIST ACVTS – Are you still with me?

How “Acronym Soup” Serves Up Big Security Advantages. Let’s start at the top: NIST is the National Institute of Standards and Technology, a US government agency that promotes innovation and industrial competitiveness by advancing measurement science, standards, and technology. CAVP…

gold 4197439 1920 edited

A Device-Unique Fort Knox: Building a Key Vault for IoT Application Keys

Secure key storage is essential for internet-of-things (IoT) devices. Most IoT devices utilize multiple application-specific keys from diverse suppliers to enable applications such as authentication, message encryption, software/firmware encryption, to name just a few. Each application requires a different key…

general atomics 2486766 1920 edited

Protecting unmanned systems with flexible key management for FPGAs

Author: Nathalie Bijnens, Director Product Management | Originally published on Military Embedded Aerospace and government defense program users have unique needs when it comes to FPGA (field-programmable gate array) devices, both in terms of security and in terms of long-term…

Back To Top