hardware
Hardware Vulnerability in Apple’s M-Series Chips
It’s yet another hardware side-channel attack: The threat resides in the chips’ data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access ...
The Chip War’s Impact on Cybersecurity and the Supply Chain
Semiconductors had their moment in the spotlight during the worst of the pandemic-induced supply chain disruptions. The shortage of semiconductors wreaked havoc on the industries that rely on them, opening up devices ...
Hunter Biden’s Laptop Revisited: What it Means for Cloud Storage
On February 1, 2023, lawyers for first son Hunter Biden took a new approach to the fact that the contents of a laptop he took for repairs and then failed to pick ...
A Basis of Trust For the IoT
In the classic grandchild scam, a con artist poses as an elderly victim’s grandchild over the phone or even in person to get “financial support.” Such scams take advantage of the fact ...
Open Compute Project Unveils Caliptra, a Silicon Root-of-Trust
Ubiquitous hardware security, whether a secure enclave or a fully trustable boot sequence, has long been a security goal. With the announcement of the Caliptra 0.5 specification today, the Open Compute Project ...
Security and Cheap Complexity
I’ve been saying that complexity is the worst enemy of security for a long time now. (Here’s me in 1999.) And it’s been true for a long time. In 2018, Thomas Dullien ...
US Aims to Revitalize Semiconductor Production With CHIPS Act
Between a global pandemic, rapid shifts in consumer spending and even inclement weather, there are a wide range of factors that have contributed to the semiconductor chip shortage. These semiconductors, which are ...
CHIPS for America Act Brings Big Bucks to Semiconductor Industry
To ease the pressure of the semiconductur shortage, the U.S. Senate last week passed the Creating Helpful Incentives to Produce Semiconductors (CHIPS) Act on July 27, 2022 and the House of Representatives ...
Is the Market for Hardware Security Appliances Doomed?
When enterprise firewalls were introduced in the mid-1990s, they served a critical function. By enforcing network connection policies, they made it possible for organizations to connect their still-evolving corporate networks to the ...
New Rowhammer Technique
Rowhammer is an attack technique involving accessing — that’s “hammering” — rows of bits in memory, millions of times per second, with the intent of causing bits in neighboring rows to flip ...