Design Con 2015

Safety & Security

Standards, regulations, and techniques for implementing safe and secure systems.

image

Security in transit

This article, third in a series of articles on the basics of electronic security, looks at security in transit. The author explains how to assess Read More

image

Tampering with the easy targets

This second in a series on the basics of electronic security looks at the variety of malware attack methods and how to identify them and then Read More

image

What does 'security' really mean?

In the first in a series on the basics of electronic security, the traditional meanings of the word ‘security’ is examined, and the author Read More

image

TrustDump: Reliable Memory Acquisition on Smartphones

A TrustZone-based memory acquisition mechanism that is capable of reliably obtaining the RAM memory and CPU registers of the mobile OS even if the Read More

image

Countermeasures for security vulnerability in Androids

A permission based security technique which includes a close analysis of the Android operating system call invocations including IPC and RPC Read More

image

Heartbleed and its impact on embedded security

The majority of the news over the past few weeks about the Heartbleed bug in OpenSSL has focused on consumer usernames and passwords security. Read More

image

Protecting multicore designs without compromising performance

As data rates climb and malicious software attacks escalate, traditional approaches to security will be replaced by integrating such protection Read More

image

Providing Root of Trust for ARM TrustZone using SRAM PUFs

Implementation and evaluation of the root of trust for the Trusted Execution Environment (TEE) provided by ARM TrustZone but using SRAM Physical Read More

image

Using the Elliptic Curve Digital Signature Algorithm effectively

How the Elliptic Curve Digital Signature Algorithm (ECDSA) can be used to simplify management and protection of secret keys. Read More

image

Secure Data Transaction Using Cryptographic Algorithms in ARM

Implementation of the open source Blowfish cryptography algorith on a 32 bit ARM LPC2148 processor and an assessment of its performance and Read More

image

Using innovative instructions to create trustworthy software solutions

A description of the Intel Software Guard Extensions (SGX), a new set of CPU instructions that give application and service providers of a variety Read More

image

Using Trusted Execution Environments in Two-factor Authentication

A comparison of the use of the hardware- based ARM TrustZone versus the Intel/AMD Trusted Execution Environment in two-factor authentication Read More

image

Virtualizing the Trusted Execution Environment

Design of a hypervisor for a ARMv7 smartphone that virtualizes the underlying hardware as the primary means by which to create a Trusted Read More

image

The Impact of Vendor Customizations on Android Security

An analysis of vendor customizations of Android devices and an assessment of their impact on overall Android security and the sources of those issues Read More

image

Using static analysis to make open source Web applications more secure

A case study in how static analysis can be used to find and eliminate coding errors in three popular safety critical open source applications – Read More

image

Adding M2M security to RTOS-enabled MCUs, MPUs or FPGAs

A brief tutorial on adding security to any connected embedded design using machine-to-machine (M2M) connectivity protocols. Read More

prev

1 of 16

next
see all Safety & Security

Insights view all

  • Currently no items

Collections
Tech Papers
Webinars
Courses

The Opportunities You're Missing for New ROI from Your OEM Products

Save & Follow 09 October 2014

Studies show data breaches have far-reaching... Read More

see all

Most Commented

  • Currently no items

Parts Search Datasheets.com

KNOWLEDGE CENTER