The Hardware Security Blog
Establishing a Special Interest Group on Common Hardware Weaknesses
It seems like almost every week, yet another hardware security vulnerability is announced. Just last week a team of researchers disclosed a new attack called “Platypus”, an acronym for "Power Leakage Attacks: Targeting Your Protected User Secrets.” This is another...
Hardware Security—A Critical Piece of the Cybersecurity Puzzle
Cybersecurity is a critical foundation of our rapidly expanding digital world-spanning hardware and software that powers everything from our personal devices to the global infrastructure. Over the past decade, significant progress has been made in many security...
Hardware Security Verification with CWE and Information Flow Analysis
Common Weakness Enumeration (CWE) is a community-developed list of software and hardware weakness types which may cause Security issues. CWEs for software have been around since 2006 but the list of hardware weaknesses is new. The list is maintained by the MITRE...
Reducing Hardware Security Risk
Introduction In today’s world, hackers, computer viruses and cyber-terrorists are making headlines almost daily. Security has become a priority in all aspects of life, and most importantly, of our businesses. Recently hackers have been targeting the heart of our most...