Webinar on Detecting Security Vulnerabilities in SoCs

Webinar on Detecting Security Vulnerabilities in SoCs
by Tom Simon on 04-06-2020 at 10:00 am

Secure development Lifecycle for SOCs

As more security related capabilities are added in hardware it is changing the effort required to ensure that SoCs are not prone to attack. Hardware has the initial appeal of creating physical barriers to attack, yet it presents its own difficulties. For one thing, a flaw in a hardware security feature is much harder to fix in the … Read More


Webinar: Ensuring System-level Security based on a Hardware Root of Trust

Webinar: Ensuring System-level Security based on a Hardware Root of Trust
by Bernard Murphy on 08-23-2018 at 7:00 am

A root of trust, particularly a hardware root of trust, has become a central principle in well-architected design for security. The idea is that higher layers in the stack, from drivers and OS up to applications and the network, must trust lower layers. What does it help it to build great security into a layer if it can be undermined… Read More