Software Defined Radio with Spread spectrum and SOQPSK for Telemetry applications
Secure Embedded Systems: Digging for the Roots of Trust
Many embedded designs absolutely have to work right. A malfunction could do unacceptable harm to persons or property. Until recently, this requirement has been addressed through careful design and hardware reliability: if the software and the logic are right and there are no hardware failures, the system will work.
But today we live in the age of undeclared cyber warfare. If your system must work, you must assume that everyone from bored hackers to criminal gangs to lavishly funded government laboratories will attack it. In order to defend your system, you must determine what—and, eventually, whom—you can trust. This is not an easy, or, some argue, even an achievable quest. But undertake it you must.
![]() |
E-mail This Article | ![]() |
![]() |
Printer-Friendly Page |
|
Altera Hot IP
Related Articles
- Secure Virtualization as an Enabler of Trusted Execution Environments in Embedded Computing
- Securing the IoT: Part 2 - Secure boot as root of trust
- Building more secure embedded software with code coverage analysis
- Anti tamper real time clock (RTC) - make your embedded system secure
- Using cryptography to secure embedded device authentication profiles: Part 2
New Articles
- System level on-chip monitoring and analytics with Tessent Embedded Analytics
- What tamper detection IP brings to SoC designs
- RISC-V in 2025: Progress, Challenges,and What's Next for Automotive & OpenHardware
- Understanding MACsec and Its Integration
- Discover new Tessent UltraSight-V from Siemens EDA, and accelerate your RISC-V development.