Introduction to Security in Silicon Labs.
Leveraging cross-layer approaches between the hardware/software interface in order to enable efficient, security driven optimization and increase trustworthiness.
Enter the nascent era of Internet of Things (IoT) and wearable devices, where small embedded devices loaded with sensors collect information from its surroundings, process it and relay it to remote locations for further analysis. Albeit looking harmless, this nascent technologies raise security and privacy concerns. Concentrating on the design flow of IoT devices, we discuss some common design practices and their implications on security and privacy.
To protect computer systems from running untrusted software programs, various methods have been proposed in software domain to validate the trustworthiness and genuineness of the delivered software code. Most of these methods lay burden on users to verify the code while a new mechanism, proof-carrying code, switches workload purely to software providers and provides a unique way to determine whether code from potentially untrusted sources is safe to execute.
Analyzing a gate-level netlist for identification and reverse engineering of malicious modifications made to an IP core.