IEEE HOST 2020 Rescheduled – Now Taking Place December 6-9, 2020
The safety and well-being of all conference participants is our priority. After evaluating the current COVID-19 situation, the decision has been made to postpone the IEEE HOST 2020 from May 4-7, 2020 and reschedule it for December 6-9, 2020. Proceedings will not… Read More
You may remember Andreas from his time at Synopsys, where he led the new Software Integrity Business Unit. He joined Tortuga Logic a couple of months ago to lead the company. Given his background in software security, I was eager to get a CEO interview. Andreas is a EE with background at IBM in the PowerPC and EDA. He directed Cadence… Read More
The first warning sign was “hackproof” in the 360Lock marketing materials. As it turns out, with no surprise to any security professional, the NFC and Bluetooth enabled padlock proved to be anything but secure.
Straightforward penetration testing revealed horrible logical and physical security for a padlock that promotes… Read More
Welcome to the inaugural Virtual Hardware Security Summit! A premier event for security experts and management teams to discuss existing trends, initiatives, and challenges in hardware security. The event features insightful leadership panels and technical presentations from both private and public industry and government.… Read More
Presented By: Dr. Jungmin Park, University of Florida
Side-channel attacks (SCAs) such as simple power analysis (SPA), differential power analysis (DPA) and correlation power analysis (CPA) have been proven to be effective to extract secret keys from hardware implementations of cryptographic algorithms. … Read More
Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you are…
Let’s count them down.
No need for security, … Read More
The Zero Trust Model of information #security simplifies how #information security is conceptualized by assuming there are no longer “trusted” interfaces, applications, traffic, networks, or users. It takes the old model— “trust but verify”—and inverts it, because recent breaches have proven that when an organization trusts,… Read More
Turkey may be the first customer for the Kargu series of weaponized suicide drones specifically developed for military use. These semi-autonomous devices have been in development since 2017 and will eventually be upgraded to operate collectively as an autonomous swarm to conduct mass synchronized attacks.
This situation… Read More
Intel comes late to the game but will be delivering an embedded defense for Return Oriented Programming (ROP) types of cyber hacks. I first blogged about this back in Sept of 2016. Yes, almost four years have passed and I had hoped it would see the light of day much earlier.
The feature, to debut in the Tiger Lake microarchitecture… Read More