Rambus’ Cryptography Research division and Riverside Research will be co-hosting a two-day workshop on identifying and preventing advanced security threats. The workshop – scheduled for November 18-19, 2015 – is targeted at hardware and software security developers with a focus on defense and government industries.
Blog
Eyeing the IoT with the ARM-powered Raspberry Pi
Did you know that Rambus’ lensless smart sensor (LSS) shield runs atop the ARM-powered Raspberry Pi 2 Model B? For the uninitiated, the RPI2 Model B packs a 900MHz quad-core ARM Cortex-A7 CPU alongside 1GB of RAM. Additional key RPI2 Model B specs include four USB ports, 40 GPIO pins, a full HDMI port, Ethernet port, combined 3.5mm audio jack and composite video, camera interface (CSI) display interface (DSI), micro SD card slot and a VideoCore IV 3D graphics core. Because the RPI2 Model B is powered by an ARMv7 processor, the board is capable of running a full range of ARM GNU/Linux distributions, including Snappy Ubuntu Core, as well as Microsoft’s flagship Windows 10 OS.
Amazon’s X1 packs up to 2TB of memory
Jeff Barr, the Chief Evangelist at Amazon Web Services, has confirmed that the company’s X1 instances will pack up to 2TB of memory. “On the high end, many of our enterprise customers are clamoring for instances that have very large amounts of memory,” Barr explained in a recent blog post. “They want to run SAP HANA and other in-memory databases, generate analytics in real time, process giant graphs using Neo4j or Titan, or create enormous caches.”
When memory and storage converge
Earlier this week, Rambus Chief Scientist Craig Hampel gave a keynote presentation at MemCon 2015 that explored the increasingly blurred lines between memory and storage. As Hampel notes, devices used as memory are typically volatile, byte addressable, directly writable, have deterministic latency and have an endurance greater than 1015 operations. In contrast, storage devices are non-volatile, block addressable, require an erase operation, have varied latency and have endurance limits that are much less than memory devices.
Extracting crypto keys from the Cloud
A Worcester Polytechnic Institute research team has confirmed that it managed to successfully extract cryptographic keys from the Cloud. According to a recently published paper, the team built upon previous work by Ristenpart, who demonstrated the viability of co-location and provided the first concrete evidence of sensitive information leakage on a commercial cloud.
Securing 2.5D and fan-outs
Semiconductor Engineering editor-in-chief Ed Sperling recently noted that the long-anticipated move to 2.5D and fan-outs raises a number of familiar questions about security.