Learning is essential to growth. As innovation drives technological advances, successful companies need to understand not only the latest developments, but more importantly, what is over the horizon. To stay relevant, companies constantly need to evolve and incorporate new technologies into their core business.
In the world of embedded security, that means defending not only against current threats, but emerging threats as well. Chaologix aggressively seeks out the best industry and academic experts to advise on the full spectrum of its activities, from technology development to market trends, from pricing to customer support. Using this knowledge, ChaoLogix collaborates and partners with its customers to provide the most secure, cost effective solutions available.
On-Demand Presentation: ARM/CHAOLOGIX SECURITY WEBINAR 2016
Originally presented on October 12, 2016.
From ARM: Hardened cryptographic subsystems are becoming more common in platform requirements for consumer and industrial devices. A cryptographic key is required for the standard schemes that allow for protecting the confidentiality, integrity and authenticity of system assets. Protection of these keys is critical, in-transit, at-rest and in-usage against a range of threats. … Read more
Presenters: Rusti Baker (ARM) and Chowdary Yanamadala (Chaologix)
ChaoLogix introduces ChaoSecure Technology, a secure standard cell library that simplifies protection of your design against side channel analysis attacks.read more
Click the link below to view the presentation. Technical Advisory Board Presentation, February 28th, 2014 by Christof Paar...read more
DPA: Differential power analysis (DPA) attacks are based on analysis of the correlation between the electricity usage of a chip in a smart card and the encryption key it contains. DPA attacks measure power levels at different parts of the chip and apply statistical...read more
Fault injection attacks induce faults in integrated circuits (ICs), which cause the ICs to behave abnormally. Attackers can exploit these abnormalities to identify or create security weaknesses, which expose sensitive information, or allow attackers to simply bypass...read more
Electromagnetic analysis exploits the sensitive information leaked through the electromagnetic field produced by the device. The power consumption during a cryptographic operation depends on the data (including secret keys) that is processed during that operation. The...read more