Ernest Worthman of Semiconductor Engineering recently noted that future ultra-low-power (ULP) IoT devices require a new paradigm for handling cryptography. “To optimize the power in
Security
Cracking SIM cards with side-channel attacks
A Jiao Tong University researcher has exploited side-channel attack techniques to crack the encryption codes protecting 3G and 4G cards. “[The cards use] AES-128, which is supposed to be virtually unbeatable by a brute-force attack, but turns out to be easy to defeat using side-channel analysis,” explained Iain Thomson of The Register. “Side-channel attacks measure things like power consumption, electromagnetic emissions and heat generation to work out what is going on in a chip. The technique has been around for years, and requires physical access to the target device.”
FDA issues cyber security warning over hospital IV pump
The FDA and U.S. Department of Homeland Security have issued an official statement concerning cybersecurity vulnerabilities associated with the Symbiq Infusion System.
When power becomes a problem
Semiconductor Engineering editor in chief Ed Sperling recently reported that the current emphasis on lowering power – in everything from wearable electronics to data centers
Jeep hack highlights critical automotive vulnerabilities
Security researchers Charlie Miller and Chris Valasek recently highlighted a series of automotive vulnerabilities when they hacked a Chrysler jeep driven by Wired journalist Andy Greenberg. Indeed, the duo managed to (wirelessly) assume control over dashboard functions, steering, transmission and brakes.
Hardware-based encryption market revenue to hit $36.4 billion
There are a number of ways for companies to secure data – whether on the perimeter or within the local area network (LAN). However, as ABI Research analysts recently confirmed, the most fundamental method in a defense-in-depth model is hardware encryption.
