skip to Main Content
Hacker

Secure Boot on Steroids

One of the biggest threats to the internet of things (IoT) is the installation of malicious software (malware) on IoT devices that changes the behavior of these devices to facilitate very specific attacks. This malware is often the first step…

Root of Trust Integration

OpenTitan: Transparency Leads to Greater Security

The statement in the title may seem counter-intuitive – aren’t most security systems based on propriety secrets? Yes, they are. These secrets are the cryptographic root keys on which the security of a system is built. However, this does not…

NISTLogo

CAVP – NIST ACVTS – Are you still with me?

How “Acronym Soup” Serves Up Big Security Advantages. Let’s start at the top: NIST is the National Institute of Standards and Technology, a US government agency that promotes innovation and industrial competitiveness by advancing measurement science, standards, and technology. CAVP…

gold 4197439 1920 edited

A Device-Unique Fort Knox: Building a Key Vault for IoT Application Keys

Secure key storage is essential for internet-of-things (IoT) devices. Most IoT devices utilize multiple application-specific keys from diverse suppliers to enable applications such as authentication, message encryption, software/firmware encryption, to name just a few. Each application requires a different key…

Back To Top