Securing IC Design

protect IP

SECURING IC DESIGN OVERVIEW The old way of delivering a product to market was to reuse as much IP as possible and verify that the correct functionality has been achieved. Todays secure systems such as smart cards and embedded systems can no longer rely on this design method. IC Attacks Throughout the supply chain, it […]

Attacking Embedded Hardware

rootoftrust training provides the skills to counteract attacks

ATTACKING EMBEDDED HARDWARE OVERVIEW Embedded devices can be attacked in numerous ways to leak privileged information. These attacks focus on vulnerabilities in the implementation of secure functions or in the chip itself. Countermeasures have been proposed to tackle these vulnerabilities singularly however attackers now use multiple attacks to achieve the same aim. The most popular […]

Cyber Security In Cars

Its now common to see electronics in cars controlling all aspects of driving; door entry, steering, braking and safety equipment such as onboard cameras and air bags. The increased functionality expected in modern cars as well as the increased complexity required by safety standards is best met through the use of microprocessor based systems. It […]

Cyber Physical Security

CYBER CRITICAL INFRASTRUCTURE OVERVIEW As governments and national authorities come to grips with cyber warfare, attention has turned to critical infrastructure; so-called because a successful attack on such a system can cause great disruption possibly leading to loss of life. Amongst critical infrastructure are energy plants, emergency networks and financial networks. It is the nuclear […]

Automotive Security

AUTOMOTIVE SECURITY OVERVIEW The automotive industry has seen a dramatic increase in security measures uptake as manufacturers come to terms with the implications of having weak or no security in a product that has been used so many times as a weapon. Combined with the rush to build intelligent self-drive cars has led to the […]

Secure IC Design

protect IP

The old way of delivering a product to market was to reuse as much IP as possible and verify that the correct functionality has been achieved. Todays secure systems such as smart cards and embedded systems can no longer rely on this design method.

Attacking Hardware

rootoftrust training provides the skills to counteract attacks

Embedded devices can be attacked in numerous ways to leak privileged information. These attacks focus on vulnerabilities in the implementation of secure functions or in the chip itself. Countermeasures have been proposed to tackle these vulnerabilities singularly however attackers now use multiple attacks to achieve the same aim. The most popular attacks are described below.

Financial Cryptography

blockchain relies on cryptography

FINANCIAL CRYPTOGRAPHY OVERVIEW The use of cryptographic currency and smart contracts (scripts residing on the blockchain that allow the automation of complex transactions) will revolutionise trading. Its potential is staggering but there are also challenges in implementing such complex structures.  MINING Cryptography has been used for many years within the financial industry, mainly to secure […]

Hardware Trojans

secure semiconductor chip

HARDWARE TROJANS OVERVIEW Due to the proliferation of semiconductor and embedded devices in all areas of industry including telecommunications, e-commerce and security, the threat from hardware trojans has never been greater or more menacing. Learn what they are and what you can do about them. HARDWARE BACKDOORS A hardware trojan is a hidden function in […]