WP_Term Object
    [term_id] => 13
    [name] => ARM
    [slug] => arm
    [term_group] => 0
    [term_taxonomy_id] => 13
    [taxonomy] => category
    [description] => 
    [parent] => 178
    [count] => 358
    [filter] => raw
    [cat_ID] => 13
    [category_count] => 358
    [category_description] => 
    [cat_name] => ARM
    [category_nicename] => arm
    [category_parent] => 178

Webinar: Improve Security For IoT Edge Devices With Custom SoCs

Webinar: Improve Security For IoT Edge Devices With Custom SoCs
by Daniel Nenni on 11-19-2016 at 7:00 am

 The only thing hotter than IoT on SemiWiki.com right now is IoT Security. In 2016 we saw a record amount of reported cyber security breaches with compelling consequences (US Presidential Election) and that trend will continue. The most recent DDoS (distributed denial of service) attacks using botnets on insecure IoT devices however were a big wake-up call to semiconductor professionals around the world, absolutely.

Coincidentally or not, trust and security were the underlying theme at ARM TechCon last month with a keynote by Jeep Hacker Charlie Miller on automotive security. The message from Simon Segars keynote that resonated with me the strongest is that security must start with silicon and must be “baked in at every level into the hardware” which brings us to the upcoming Open Silicon/ARM webinar that I am involved with:

Improve Security For IoT Edge Devices With Custom SoCs

Date: Tue, Dec. 13, 2016

Time: 08:00 AM PST
Duration: 60 mins

This joint Open-Silicon and ARM® webinar, moderated by Daniel Nenni, CEO and founder of SemiWiki.com, will address the security issues associated with IoT edge devices and how to make them secure with custom SoCs. The key focus areas for security in IoT edge devices are secure boot, data security, tamper proofing and device authentication. Efficient security features are implemented with a combination of hardware and software. Features like root of trust with secure boot and tamper proofing with physical security are more efficient when implemented in hardware and IP by a turnkey ASIC vendor. Features like data security and device authentication are more efficiently implemented in software by OEMs leveraging purpose-built hardware.

The advantages of hardware-implemented security features with custom SoCs include a significant improvement in acceleration time (ex: boot-up time), mitigation of potential tampering, and enabling a purpose-built device from a system point of view. The ARM TrustZone® CryptoCell family of security IPs provides hardware-based platform security for cost efficient implementation in custom SoCs, as well as a fast path to market. Open-Silicon’s custom SoC IoT platform, based on ARM’s Cortex-M and TrustZone® CryptoCell, enables OEMs to develop secure IoT edge devices with lower risk and shorter development time. This platform supports root of trust with secure boot and a secure over-the-air firmware/application upgrade.


Here’s what you will learn

  • Why security is critical for IoT edge devices
  • Why edge devices built with custom SoCs improve security
  • About few reference designs for IoT edge device security applications
  • About the role of turnkey ASIC development and IP companies in designing secure IoT edge devices


Yossi Weisblum
Product Marketing Manager, System and Software Group

Yossi manages product marketing for ARM’s CryptoCell subsystem. He has an extensive background in product marketing across several platforms, including connectivity, wireless, multimedia and mobile. Prior to joining ARM in 2016, Yossi worked at Intel for over ten years, where he was instrumental in the development of the company’s wireless connectivity solutions.

Kalpesh Sanghvi
SoC and System Solutions Manager

Kalpesh has over a decade of professional experience in the semiconductor and embedded industry. He has in-depth knowledge of software development and bring-up for SoC/ASIC designs, and domain expertise in IoT, storage solutions, security solutions, networking and multimedia reference designs. Kalpesh is also experienced in ASIC design flows, pre-silicon and post-silicon bring-up and validation as well as prototyping solutions.


It is a privilege to be involved with this type of event because webinars really are the next best thing to being there. Even though thousands of people like myself spent the better part of a week at ARM TechCon it was impossible to catch everything that needed to be caught so these follow-up webinars are important. Space is limited so be sure and register now. If for some reason you register and miss the live version a link to the replay will be sent to you automatically.

We have some very knowledgeable security professionals blogging on SemiWiki now. You can read our security related blogs HERE.


There are no comments yet.

You must register or log in to view/post comments.