Keeping Current

Learning is essential to growth. As innovation drives technological advances, successful companies need to understand not only the latest developments, but more importantly, what is over the horizon. To stay relevant, companies constantly need to evolve and incorporate new technologies into their core business.

In the world of embedded security, that means defending not only against current threats, but emerging threats as well. Chaologix aggressively seeks out the best industry and academic experts to advise on the full spectrum of its activities, from technology development to market trends, from pricing to customer support. Using this knowledge, ChaoLogix collaborates and partners with its customers to provide the most secure, cost effective solutions available.

On-Demand Presentation: ARM/CHAOLOGIX SECURITY WEBINAR 2016

Originally presented on October 12, 2016.

From ARM: Hardened cryptographic subsystems are becoming more common in platform requirements for consumer and industrial devices. A cryptographic key is required for the standard schemes that allow for protecting the confidentiality, integrity and authenticity of system assets. Protection of these keys is critical, in-transit, at-rest and in-usage against a range of threats. … Read more

Venue: On-Demand

Presenters: Rusti Baker (ARM) and Chowdary Yanamadala (Chaologix)

Click HERE to register and view the webinar.
Differential Power Analysis

Differential Power Analysis

DPA: Differential power analysis (DPA) attacks are based on analysis of the correlation between the electricity usage of a chip in a smart card and the encryption key it contains. DPA attacks measure power levels at different parts of the chip and apply statistical...

read more
Electromagnetic Fault Injection Attacks

Electromagnetic Fault Injection Attacks

Fault injection attacks induce faults in integrated circuits (ICs), which cause the ICs to behave abnormally. Attackers can exploit these abnormalities to identify or create security weaknesses, which expose sensitive information, or allow attackers to simply bypass...

read more
Differential Electromagnetic Analysis

Differential Electromagnetic Analysis

Electromagnetic analysis exploits the sensitive information leaked through the electromagnetic field produced by the device. The power consumption during a cryptographic operation depends on the data (including secret keys) that is processed during that operation. The...

read more