Safety & Security

Standards, regulations, and techniques for implementing safe and secure systems.


Securing flash memory in automotive applications

Various security architectures can help secure flash memory against malicious or accidental modification. Read More


Defend encryption systems against side-channel attacks

Systems using encryption can still leak information that compromises data security unless properly protected. Read More


Security needs more than checklist compliance

Following a checklist of requirements is only a start for designing security into electronics products. Read More


Software Standards Compliance 101: First assess your system’s risk

An introduction to software standards compliance and how to perform a system safety or security assessment. Read More


Securing the IoT: Part 2 - Secure boot as root of trust

The importance of implementing connected devices with a secure boot mechanism and its role as the “root of trust” and cornerstone of an Read More


Securing the IoT: Part 1 - Public key cryptography

The authors detail security risks facing the developer of an Internet of Things device and recommend the best public key-based algorithms to use. Read More


Security in transit

This article, third in a series of articles on the basics of electronic security, looks at security in transit. The author explains how to assess Read More


Tampering with the easy targets

This second in a series on the basics of electronic security looks at the variety of malware attack methods and how to identify them and then Read More


What does 'security' really mean?

In the first in a series on the basics of electronic security, the traditional meanings of the word ‘security’ is examined, and the author Read More


TrustDump: Reliable Memory Acquisition on Smartphones

A TrustZone-based memory acquisition mechanism that is capable of reliably obtaining the RAM memory and CPU registers of the mobile OS even if the Read More


Countermeasures for security vulnerability in Androids

A permission based security technique which includes a close analysis of the Android operating system call invocations including IPC and RPC Read More


Heartbleed and its impact on embedded security

The majority of the news over the past few weeks about the Heartbleed bug in OpenSSL has focused on consumer usernames and passwords security. Read More


Protecting multicore designs without compromising performance

As data rates climb and malicious software attacks escalate, traditional approaches to security will be replaced by integrating such protection Read More


Providing Root of Trust for ARM TrustZone using SRAM PUFs

Implementation and evaluation of the root of trust for the Trusted Execution Environment (TEE) provided by ARM TrustZone but using SRAM Physical Read More


Using the Elliptic Curve Digital Signature Algorithm effectively

How the Elliptic Curve Digital Signature Algorithm (ECDSA) can be used to simplify management and protection of secret keys. Read More


Secure Data Transaction Using Cryptographic Algorithms in ARM

Implementation of the open source Blowfish cryptography algorith on a 32 bit ARM LPC2148 processor and an assessment of its performance and Read More


1 of 16

see all Safety & Security

Insights view all

  • Currently no items

Tech Papers

Securing Modern-day Devices with Embedded Virtualization and ARM TrustZone Technology

Save & Follow 01 January 2015

This paper takes a closer look at security as... Read More

see all

Most Commented

  • Currently no items

Parts Search