IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
by Admin on 12-06-2020 at 12:00 am

IEEE HOST 2020 Rescheduled – Now Taking Place December 6-9, 2020

The safety and well-being of all conference participants is our priority. After evaluating the current COVID-19 situation, the decision has been made to postpone the IEEE HOST 2020 from May 4-7, 2020 and reschedule it for December 6-9, 2020. Proceedings will not… Read More


CEO Interview: Andreas Kuehlmann of Tortuga Logic

CEO Interview: Andreas Kuehlmann of Tortuga Logic
by Bernard Murphy on 10-23-2020 at 6:00 am

CEO interview

You may remember Andreas from his time at Synopsys, where he led the new Software Integrity Business Unit. He joined Tortuga Logic a couple of months ago to lead the company. Given his background in software security, I was eager to get a CEO interview. Andreas is a EE with background at IBM in the PowerPC and EDA. He directed Cadence… Read More


Painful IoT Security Lessons Highlighted by a Digital Padlock

Painful IoT Security Lessons Highlighted by a Digital Padlock
by Matthew Rosenquist on 10-04-2020 at 10:00 am

Painful IoT Security Lessons Highlighted by a Digital Padlock

The first warning sign was “hackproof” in the 360Lock marketing materials. As it turns out, with no surprise to any security professional, the NFC and Bluetooth enabled padlock proved to be anything but secure.

Straightforward penetration testing revealed horrible logical and physical security for a padlock that promotes… Read More


Virtual Hardware Security Summit 2020!

Virtual Hardware Security Summit 2020!
by admin on 09-15-2020 at 8:30 am

Welcome to the inaugural Virtual Hardware Security Summit! A premier event for security experts and management teams to discuss existing trends, initiatives, and challenges in hardware security. The event features insightful leadership panels and technical presentations from both private and public industry and government.… Read More


Beyond Root: Custom Firmware for Embedded Mobile Chipsets | Christopher Wade | Hardwear.io Webinar

Beyond Root: Custom Firmware for Embedded Mobile Chipsets | Christopher Wade | Hardwear.io Webinar
by Daniel Nenni on 09-03-2020 at 8:00 am

Beyond Root: Custom Firmware for Embedded Mobile Chipsets | Christopher Wade | Hardwear.io Webinar
About Webinar:
—————-
Rooting a smartphone is often considered the ultimate method to allow a user to take complete control of their device. Despite this, many smartphones contain hardware
Read More

Side-Channel Leakage Assessment of Cryptographic Modules

Side-Channel Leakage Assessment of Cryptographic Modules
by Daniel Nenni on 08-19-2020 at 12:00 pm

Presented By: Dr. Jungmin Park, University of Florida

Short summary

Side-channel attacks (SCAs) such as simple power analysis (SPA), differential power analysis (DPA) and correlation power analysis (CPA) have been proven to be effective to extract secret keys from hardware implementations of cryptographic algorithms. … Read More


The 10 Worst Cybersecurity Strategies

The 10 Worst Cybersecurity Strategies
by Matthew Rosenquist on 07-26-2020 at 8:00 am

The 10 Worst Cybersecurity Strategies

Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you are…

Let’s count them down.

10. Cyber-Insurance

No need for security, … Read More


What is Zero Trust Model (ZTM)

What is Zero Trust Model (ZTM)
by Ahmed Banafa on 07-05-2020 at 10:00 am

What is Zero Trust Model ZTM

The Zero Trust Model of information #security simplifies how #information security is conceptualized by assuming there are no longer “trusted” interfaces, applications, traffic, networks, or users. It takes the old model— “trust but verify”—and inverts it, because recent breaches have proven that when an organization trusts,… Read More


Killer Drones to be Available on the Global Arms Markets

Killer Drones to be Available on the Global Arms Markets
by Matthew Rosenquist on 07-01-2020 at 10:00 am

Killer Drones to be Available on the Global Arms Markets

Turkey may be the first customer for the Kargu series of weaponized suicide drones specifically developed for military use.  These semi-autonomous devices have been in development since 2017 and will eventually be upgraded to operate collectively as an autonomous swarm to conduct mass synchronized attacks.

This situation… Read More


Intel Designs Chips to Protect from ROP Attacks

Intel Designs Chips to Protect from ROP Attacks
by Matthew Rosenquist on 06-28-2020 at 10:00 am

Intel Designs Chips to Protect from ROP Attacks

Intel comes late to the game but will be delivering an embedded defense for Return Oriented Programming (ROP) types of cyber hacks. I first blogged about this back in Sept of 2016. Yes, almost four years have passed and I had hoped it would see the light of day much earlier.

The feature, to debut in the Tiger Lake microarchitecture… Read More