Trusted Execution Environments (TEEs) such as Arm TrustZone, while well-intentioned, present challenges for engineers. First, they doesn't allow for partitioning between many sensitive functions within a secure domain, and, perhaps more importantly, they can be very difficult to use. Don Barnetson of Hex-Five discusses TEEs and multi-zone security, a new technology for the RISC-V ISA that enables limitless partitions, each with its own set of resources. And, it has minimal impact on existing development processes and tools.
Previous White Paper
A desire in the development community to use Linux is often at odds with the security requirements of an or...
We also recommend:
This week on the Embedded Insiders, Brandon and Rich discuss an age-old controversy: What’s more secure? Proprietary or open-source software?
The Trusted Computing group (TCG) released its TPM 2.0 Library specification Revision 1.59.
The Ada language abstracts most direct interaction with memory onto compilers, transitioning things like memory checks from a manual human operation to automatic. Get ready to save tons of debug time.
Crystal Display Systems are helping to ensure security and safety as the world attempts to resume back to normal working life.
The number of crimes related to the unauthorized use of personal data on the Internet is increasing. Cybersecurity Ventures predicted that cybercrime will cost the world $6 trillion annually.
The Internet of Secure Things Alliance (IoXT) is pushing a common (and obvious) goal for our industry. They want to keep all of our connected devices secure.
Adding more cloud compute won’t solve the problem of managing exponentially growing quantities of data for IoT devices. We need to shift much of the “thinking” from the cloud to endpoint devices...
This paper highlights why a software approach to IoT security implementation can no longer meet acceptable levels of assurance and protection and explains the reasons why a hardware-based approach...
IAR Systems released its newest version the functional safety edition of IAR Embedded Workbench for Renesas’ RX Family of microcontrollers (MCUs).
VARTA Microbattery's trade fair presentation focused on Nickel-Metal Hydride cells, Lithium coin cells, and Lithium-Ion coin cells (microbatteries) as energy supply for applications in the IoT.
NXP is excited to bring you the NXP eXperience – an online and interactive destination for all our news, content and training as it was originally planned for the show.
In this week's Embedded Executives, Rich Nass is joined by Mike Nicholson, Embedded Software/Systems Architect, MultiTech.
Computers, servers and the people that operate them used to be the primary target of attackers. Today, because of increasing connectivity and dependence on networks, network equipment has become...
This paper describes how static analysis plays a key role in risk management of medical device software development.
This paper discusses how static analysis tools provide an ideal (and automated) companion to code reviews by supporting the process and increasing the defect removal rate.
This paper takes a look at the role of static application security testing tools (SAST) and in particular GrammaTech CodeSonar and how it can be used in DevSecOps and continuous development pipelines
IoT Security Top 20 Design Principles
Systems today are more connected than ever before, increasing not only the “attack surface” but the motivation for an attack itself. How is your company addressing securing for your connected systems?
IAR Systems launched a new version of its security development tool C-Trust.
With accelerating technology innovation, medical devices are becoming more sophisticated and more connected. Consequently, as in most mission-critical systems, safety and security are two...