Life is a SoCJust Why and How are Hardware Security achieved in SoC DesignsImportance of Security in SoC DesignsSep 21
lei zhouConfidential computing and open compute Project — Part 2: Interconnect and Security ProtocolWith confidential computing’s threat model discussed in part 1, we are now deep-diving into heterogenous computing platform and understand…Apr 11
lei zhouEstablish device trustworthiness via attestation and TPM2.0’s roleAndroid PlayIntergity API helps you check that service requests are coming from your genuine app binary running on a genuine Android device…May 2May 2
BugProveBeyond Firmware Encryption: Enhancing Embedded Device SecurityIn today’s fast-paced digital world, securing embedded devices have become increasingly important. The firmware of a device is one of its…Apr 5Apr 5
InObject ComputingbyObject Computing, Inc.From Rework to Results: How We Achieved Cost-Efficiency through Embedded SecurityBy Janelle MorrisMar 14Mar 14
Life is a SoCJust Why and How are Hardware Security achieved in SoC DesignsImportance of Security in SoC DesignsSep 21
lei zhouConfidential computing and open compute Project — Part 2: Interconnect and Security ProtocolWith confidential computing’s threat model discussed in part 1, we are now deep-diving into heterogenous computing platform and understand…Apr 11
lei zhouEstablish device trustworthiness via attestation and TPM2.0’s roleAndroid PlayIntergity API helps you check that service requests are coming from your genuine app binary running on a genuine Android device…May 2
BugProveBeyond Firmware Encryption: Enhancing Embedded Device SecurityIn today’s fast-paced digital world, securing embedded devices have become increasingly important. The firmware of a device is one of its…Apr 5
InObject ComputingbyObject Computing, Inc.From Rework to Results: How We Achieved Cost-Efficiency through Embedded SecurityBy Janelle MorrisMar 14
BugProveEU Cyber Resilience Act (CRA) — All you need to know in a nutshellNew regulations are always difficult to understand. They are filled with confusing terms and can seem scary, especially if they affect…May 2
Hilda MachandoAI, Security, and the Cloud Part 1: OverviewIn this 4-part series, I will attempt to break down and explain security for the cloud with AI. Part 1 will give an overview and…Jul 13, 2023
David MerianThe Attack Stack for EV’sEV’s (electric vehicles) are like “20 computers on wheels”. With connectivity to charging stations, mobile phone, infotainment systems…Jan 30, 2023