Enter Title

Designing for Security

System hacks and attacks are in the news all too frequently these days. Even small embedded systems are vulnerable to various attack vectors. Security must be built into the design from the ground up, starting with architecture selection and component choice. This topic presents an updated view of designing with security in mind including hardware features available in the latest MCU, software tools and techniques, and the newest stand-alone security products.

The Tech Between Us Podcast Designing for Security

Featured Supplier:

Full Podcast (35:02mins) Transcript

Listen on SpotifyPandoraGoogleAppleAmazon Music

Introduction (00:30mins) Transcript

Condensed Podcast (10:02mins) Transcript

In this episode, we chat with Alan Grau, VP of Sales & Business Development for PQShield and consider the security challenges and opportunities as embedded devices continue to increase in popularity both for consumers and design engineers, alike. Then explore more from our sponsor partner Infineon Technologies.

Meet the Experts

Raymond Yin

Podcast Host and Director of Technical Content at Mouser Electronics

Alan Grau

VP of Sales & Business Development, PQShield

The IoT Trusted Zone

Featured Supplier:

Microchip
a digital visualization of the world with embedded networking

A security breach is devastating, but use of best practices in design, like isolating security-related hardware into "Trusted Zones," can limit attempts to access content from outside the zone and continually monitor variations in temperature and voltage.

Read time 6 mins

Read full article »

Then, Now and Next: Designing for Security

Featured Supplier:

Catch up on the tech landscape of Designing for Security – where we were, where we are, and where we are going.

Transcript

Learn more STMicroelectronics STSAFE-A110 Authentication ICs »

Encryption: The Key to Embedded Security

Featured Supplier:

Analog Devices
an embedded chip on a electronic board

Having strong security practices in embedded designs has never been more important. What security challenges do embedded designs face, what role does hardware encryption play, and what practices can engineers follow to help safeguard their designs against potential threats?

Read time 7 mins

Read full article »

Securing the Edge in an Unsecure World

Featured Supplier:

NXP

With more than 21 billion IoT devices worldwide and an increased reliance on cloud computing, security is critical—yet billions of devices remain vulnerable to attack. How did the industry become so unsecure? What is edge computing and how can it, along with hardware, improve edge device security?

Read time 5 mins

Read more »

a car showing showing sensor lines around it with an exclamation point in a triangle

Designing for Security:

The Connected Car

Identifying and preventing security threats against connected cars calls for sophisticated threat intelligence. Strong security for the connected car takes an integrated approach, incorporating the vehicle, the network and the back end.

Why is the Car of the Future a Target?

The more lines of code the bigger the target and the autonomous car beats them all.

MODERN PASSENGER JET - 15 MILLION
MODERN COMPUTER OS - 40 MILLION
MODERN CAR - 100 MILLION
NEAR FUTURE AUTONOMOUS CAR - 300 MILLION

Ways Hackers Can Gain Access:

USB
WIRELESS AND CELLULAR
NAVIGATION CONSOLES
BLUETOOTH

Ways to Mitigate the Risk.

Cryptographic Solutions

Products like the AMD-Xilinx Spartan-7 Field Programmable Gate Arrays are used for secure V2X connectivity and environmental monitoring

Xilinx Spartan 7 Chip
  • Accelerated design productivity
  • Enabled by Vivado® ML Standard Edition
  • Correct-by-construction block-level design with Vivado IP Integrator
  • Scalable optimized architecture, comprehensive tools and IP reuse
Xilinx

Designing the "Trusted Zone"

System partitioning separates security-related hardware, software and data in a "Trusted Zone," limiting outside access.

NON-SECURE - TRUSTED ZONE - SECURE
NON-SECURE - TRUSTED ZONE - SECURE

Thank you to our supplier partners for their participation in helping us bring this content to our valued customers.