Zephyrnet Logo

Tag: hardware security

[Cycuity in Semiconductor Engineering] Creating comprehensive and verifiable hardware security requirements

Developing effective hardware security requirements is one of the trickiest aspects of building trustworthy electronic products. Even highly skilled and experienced teams don’t always...

Cybersecurity Risks Of Automotive OTA

Modern vehicles increasingly resemble supercomputers on wheels, with many electronic control units (ECUs) networked together as increasingly sophisticated software is installed and updated. Similar...

Centrally manage access and permissions for Amazon Redshift data sharing with AWS Lake Formation

Today’s global, data-driven organizations treat data as an asset and use it across different lines of business (LOBs) to drive timely insights and better...

IDEAS Online Technical Conference Features Intel, Qualcomm, Nvidia, IBM, Samsung, and More Discussing Chip Design Experiences

Ansys is hosting IDEAS Digital Forum 2022, a no-cost virtual event that brings together industry executives and technical design experts to discuss the latest...

10 tips to avoid Black Friday and Cyber Monday scams

It pays not to let your guard down during the shopping bonanza – watch out for some of the most common scams doing...

Challenges And Solutions In Chip Design

Low Power-High Performance OPINION IDEAS technical event to feature Intel, Qualcomm, Nvidia, IBM, Samsung, and more discussing their chip design experience....

Memory-Based Cyberattacks Become More Complex, Difficult To Detect

Memories are becoming entry points for cyber attacks, raising concerns about system-level security because memories are nearly ubiquitous in electronics and breaches are difficult...

Side-Channel Secure Translation Lookaside Buffer Architecture

A new technical paper titled “Risky Translations: Securing TLBs against Timing Side Channels” was posted by researchers at Ruhr University Bochum (Germany) and Cyber-Physical...

Hardware Trojan Inserted Inside A RISC-V Based Automotive Telematics Control Unit

A new technical paper titled “On the Feasibility of Remotely Triggered Automotive Hardware Trojans” was published by researchers at Georgia Tech. “In this paper, we...

Locking-Based Design-For-Security Methodology To Prevent Piracy of RF transceiver ICs

A new technical paper titled “Anti-Piracy Design of RF Transceivers” was published by researchers at Sorbonne Universite (France). Abstract: “We present a locking-based design-for-security methodology to...

Using eFPGAs For Security

Andy Jaros, vice president at Flex Logix, talks about the use of eFPGAs to keep pace with security risks over longer chip lifetimes, how...

Vulnerability of Neural Networks Deployed As Black Boxes Across Accelerated HW Through Electromagnetic Side Channels

This technical paper titled “Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel” was presented by researchers...

Latest Intelligence

spot_img
spot_img