Part 2 of the Semiconductor Engineering interview with Asaf Shen, Chowdary Yanamadala, Timothy Dry, and Eric Sivertson.
Semiconductor Engineering interview with Asaf Shen, Chowdary Yanamadala, Timothy Dry, and Eric Sivertson.
Yet again, a massive attack puts the focus on cybersecurity. The late October widespread denial-of-service hacking was top of mind at a panel of experts gathered at the ARM TechCon conference in Santa Clara, Calif. this week.
Security and interference of its wireless systems are two of the most critical elements of the connected vehicle.
Botnets, once limited to computer networks, are expanding and changing as more devices are connected to the Internet—and becoming much harder to detect and destroy.
The advent of Internet-connected devices, the so-called Internet of Things (IoT), offers myriad opportunities and significant risks. The pervasive collection and sharing of data by IoT devices constitutes the core value proposition for most IoT applications.
This is the age where technology is expected to do more, faster, anonymously, and often invisibly. And it’s supposed to use less power, with smaller footprints, unobtrusively and intuitively. And all that needs to be protected with cryptography. That’s the goal, at least
Differential power analysis (DPA) has been a threat vector on the chip landscape for a number of years. It was discovered around the mid 1990s by the teams at Rambus’ Cryptography Research Division, and turned out to be a very effective tool for compromising the ubiquitous SIM card environment.