New Webinar: Detecting Security Vulnerabilities in a RISC-V Based System-on-Chip | WATCH IT NOW

Articles

3 Steps to a Security Plan

3 Steps to a Security Plan

Assessing the security of a hardware design sometimes seems like a combination of the guy looking under a streetlight for his car keys, because that’s where the light is (We have this tool, let’s see what problems it can find) and a whack-a-mole response to the latest...

read more
Hardware CWEs…This will Change Everything

Hardware CWEs…This will Change Everything

Something happened in February of this year that will change the way security of integrated circuits (ASICs), System on Chips (SoCs), and field-programmable gate arrays (FPGAs) are specified, designed, and verified...

read more
Tortuga Logic Scores Role in DoD Security Programs

Tortuga Logic Scores Role in DoD Security Programs

It should be no surprise in the current climate that the US government is ramping up investment in microelectronics security, particularly with an eye on China and investments they are making in the same area. This has two major thrusts as I read it: to ensure trusted...

read more
Verifying Security in Processor-Based SoCs

Verifying Security in Processor-Based SoCs

Security in modern systems is of utmost importance. Device manufacturers are including multiple security features and attack protections into both the hardware and software design. For example, the Synopsys DesignWare ARC Processor IP includes many security functions...

read more