Pages Menu
Categories Menu

Posted by on Mar 6, 2014 in Semiconductor, Telecom, Wireless | 0 comments

ARM TrustZone Technology

ARM TrustZone Technology

Mobile devices are handling lot of important data such as IMEI, SIM lock protocol, bank credentials and platform images. Majority of the embedded devices are running open source software which calls for proper security system across the device. This puts the device under very high risk where device hackers can copy, damage or modify these important assets for their benefits. Best security solution for an embedded device is to have a dedicated hardware security module with lesser powerful processor, outside or inside SOC which manages cryptographic operations to verify assets. But this solution will have significant impact on power efficiency, design process, area and performance of the device. Other issues are communication across processors, data share/flushing to external memory and still attacker can steal the decrypted content repeatedly at the application level leading to protection of assets under risk. ARM TrustZone technology provides robust security framework solution by well designed hardware architecture and secure software with minimal impact on the cost. The security of the system is achieved by...

Read More

Posted by on Dec 16, 2013 in Consumer Electronics, Enterprise Mobility, Networks, Smart Devices, Wireless | 0 comments

Android and Security

Android and Security

The basic nature of mobile devices which are small, portable, remote, multi-purposed, wirelessly connected, makes their exposure to security threats significantly higher than those of desktops and laptops.  Mobile security is extremely multi-faceted and includes: Mobile Application Management, High level of data-privacy protection and Strong Authentication. There is a need to strike the right balance between securing the device and data without impinging the usability. Enterprises are sensitive to the cost of administering and managing security platforms and their interworking with legacy IT platforms. The wide adoption of Android as an operating system, its virtue of being an open source standard has tremendous implication for providing ‘security features’ that minimize its vulnerability from external attacks. Android provides following intrinsic security features: Kernel-level sandboxing and isolation (Applications are isolated from each-other which reduces vulnerability to malicious attacks or exploitation from vulnerable applications) Individual Dalvik Virtual Machine for Each Application (which ensures further isolation) Managed Code Model Protection against kernel call exploits Explicit resource access permissioning Platform signing for application access...

Read More

Posted by on Jun 10, 2013 in Automotive, Consumer Electronics, Smart Devices, Wireless | 0 comments

The Connected Car

The Connected Car

From humble beginnings in the 80’s the amount of electronics in car has been steadily increasing. Industry pundits estimate that the electronic content in cars is growing at a CAGR of 6 to 10%. The initial motivation for introducing electronics in the an automobile was to target digital engine control. Fast forwarding to 2013, we see that electronics is all pervading in an auto and provides a host of passenger entertainment, driver assistance and safety features. The automotive players are now constants and take center stage in the best global expositions of consumer electronics and wireless systems. One of the major areas of focus in the automobile industry is to exploit advancements in communication and connectivity and integrate them in the car. Auto manufacturers have now turned their product into what is termed as a ‘Connected Car’. The Connected Car opens up a new dimension for manufacturers who will be able to continue to offer services to their customer after the initial sale. Smart In-Vehicle-Infotainment Systems enable the occupants...

Read More