Global Sources
EE Times-Asia
Stay in touch with EE Times Asia
EE Times-Asia > Advanced Search > security system attack

security system attack Search results

?
?
total search97 articles
2011-06-09 Applied Micro unveils single-core PacketPro processor
The single-core Keelback APM86791, which uses an ARM core in its SLIMpro subsystem, is designed for growing network transport, enterprise and consumer markets providing network security protection
2014-05-02 Securing MCU RTOS for the Internet of Things
Find out how to protect small devices on the Internet of Things.
2013-06-25 Utilising non-volatile memory IP in SoC designs
Integrating anti-fuse NVM on chip for program storage results to increased margin as well as independence from vagaries of supply chain and component availability.
2013-09-04 Static vs dynamic analysis for code devt (Part 1)
Consider the strengths and weaknesses of static and dynamic code analysis in the development of secure C or C++ code.
2014-12-02 Significance of partitioning for date centres (Part 1)
In this two-part series, we will consider some of the key places where we see partitioning technology utilised, and explore some of its impact and implications within the data centre.
2014-04-28 Sensors cross the megapixel threshold
The CMOS image sensor race in applications ranging from automotive to sports analytics and food inspections moves beyond the megapixel battle and is defined by a more complex criteria including frame rates, sensitivity, integration time, and light sources.
2015-01-27 Self-encrypting SSDs to become de facto standard
Self-encrypting SSDs are starting to become more appealing as they allow for encryption at the hardware level, regardless of OS, and can be deployed in a variety of scenarios.
2007-09-03 Secure supervisor chip meets PCI-PED requirements
Specifically designed to meet the requirements of PCI-PED certification, Maxim's secure supervisor chip integrates two tamper-detection comparators.
2011-11-17 Mobile patent punch-up survival guide
Experts believe that the disputes come at a time when priorities are shifting from circuits to systems in electronics patents, as products evolve to embrace systems of systems.
2008-11-18 Is analog processing dead?
So, is analog processing dead? Analog is more important now in the 21st century that it was 20 years ago!
2014-07-21 Interview: Infineon products take on counterfeiting
Infineon is bolstering its Optiga line to protect devices from malware and to control access mechanisms for secure software updates, adding flexibility for adapting to a variety of applications.
2005-07-04 Industrial networks move to standards
Hardware interfaces and software protocols are highly flexible; however, designers need to be cognizant of the limitations of each in an industrial environment.
2016-02-18 Imagination talks product differentiation at China roadshow
The Imagination Summit 2015 featured speakers from Imagination Technologies, Mentor Graphics, Rightware, CSIA, Synopsys, Dolby, SMIC and Ingenic stressing new opportunities and the need for product differentiation to beat price competition.
2015-12-14 How to securely update FPGA-based embedded systems
This article explains the requirements for a safe, secure and reliable remote update facility, and how a flash-embedded FPGA can provide the key functions needed to satisfy such needs.
2012-08-03 How to avoid hacking in medical systems
Learn about microcontroller features and modern design techniques that address these hacking concerns.
2005-04-18 How safe is private data on cell?
The recent hacking of Paris Hilton's address book-stored on the TV celebrity's Sidekick II smart phone and backed up by T-Mobile's server-has raised questions in the engineering community about whether personal data is adequately protected in the current generation of cellular products.
2012-03-16 Fundamentals of embedded firewalls (Part 2)
Know the requirements, issues, filtering options and best practices when building embedded firewalls.
2012-02-23 Fundamentals of embedded firewalls (Part 1)
Learn about the need to defend against the growing number of vulnerabilities and hacking dangers.
2002-05-28 Four-way encoding aims to beat smartcard hackers
A smartcard architecture based on asynchronous design techniques has been proposed as a solution to a hacking technique that could compromise existing crypto-processor designs.
2005-08-01 For PS3's creator, this isn't a game
Sony's Ken Kutaragi turns his vision into a reality as he sets a computer revolution in motion with the new Cell-powered PS3.
2009-07-13 Eyeing Intel's strides in SoC biz
Intel Corp. isn't giving much detail on its two-year old initiative to become an SoC supplier. But interviews with executives and analysts show the company is making gradual progress laying the foundations to build competitive SoCs.
2013-05-22 Enhance functional safety in embedded designs
Find out how to increase functional safety in networked embedded designs.
2007-10-18 Employ a secure flavor of Linux
Linux is popular for many embedded applications, but if your application requires it, make sure you put in the hooks to keep hackers out.
2006-10-02 DRM challenges inhibit digital media opportunities
The lack of DRM interoperability is becoming a major issue as digital media markets grow. DRM and CA are important technologies in today's digital content markets, representing a barrier to digital content markets, a competitive weapon and a direct market opportunity.
2013-07-03 Disguised memory-access patterns secures cloud
MIT researchers described a secure hardware component, dubbed Ascend, that disguises a server's memory-access patterns, making it impossible for an attacker to infer anything about the stored data.
2014-01-29 Developing IoT for industrial control (Part 1)
In Part 1, we look into the requirements that the IP-enabled Internet of Things must meet.
2016-02-10 Designing customised intelligent IoT gateway
As companies seek to improve their business results and differentiate themselves from the competition, customised solutions are clearly required.
2008-05-01 Defining the memory's role in a secured environment
Today's mobile phones are used for a myriad of new applications that involve storing sensitive data and providing such secure services as mobile payments. With phones storing more critical information than ever before, it is increasingly important to keep them safe from rogue software.
2013-07-12 Creating a secure embedded dev't process
Understand the underlying software development process and tools for building secure software.
2016-04-14 Compliance, risk assessments prove vital in supplier evaluation
In this article, find out what supplier risk evaluation is, how it increases exposure to supplier risk, compliance problems and what the best practices are for risk reduction and containment.
Bloggers Say

Bloggers Say

See what engineers like you are posting on our pages.

?
?
Back to Top