Breaking News
Intel Quark Runs on Roof, Raises Questions
9/10/2013

Image 1 of 2      Next >

Intel CEO Brian Krzanich holds up a 32nm Quark SoC.
Intel CEO Brian Krzanich holds up a 32nm Quark SoC.

Image 1 of 2      Next >

Return to Article

View Comments: Oldest First | Newest First | Threaded View
Page 1 / 3   >   >>
rick merritt
User Rank
Blogger
Must be 32 bit
rick merritt   9/10/2013 5:08:02 PM
NO RATINGS
1 saves
Chatting with fave analysts Kevin Krewell and David Kanter in the IDF media room I realize Quark must be 32 bit. There's just no need for 64-bit addressing in IoT for a loooooong time.

alex_m1
User Rank
CEO
Is it really more secure?
alex_m1   9/11/2013 5:10:20 AM
NO RATINGS
At least according to a few software engineers I asked about this subject, symantec and wind river doesn't offer something unique security-related. It's mostly branding. I wonder if this is the only benefit for this chip, or are there others planned?

sw guy
User Rank
Rookie
Re: Is it really more secure?
sw guy   9/11/2013 6:43:58 AM
NO RATINGS
Of course you can be secure with other CPU, too. As an example, why is ARM used inside chip+PIN card reader ?

I do not want to say using Quark was a bad decision, just that public justification may differ from actual one.

GSMD
User Rank
Manager
Re: Must be 32 bit
GSMD   9/11/2013 10:35:20 AM
NO RATINGS
The reasoning by Daikin is a load of nonsense. Freescale ARM and Power products are the only mass market processors and controllers available with tamper detect, secure boot, flips 140-3 grade security and in certain products side channel analysis production. maxim and a few others make parts but no support across the entire range. I just finished design of a tablet ref design for mil grade security and only the Freescale I.mx6 cut it. granted the Mcafee stack helps but security 101 says that the root of trust begins in hw. Add to all this arm's Trustzone really hels secure os partitioning. In summary, it looks to be a poor technical decision. Note, am not a Freescale employee or contractor. just a security researcher .

alex_m1
User Rank
CEO
Re: Must be 32 bit
alex_m1   9/11/2013 10:38:07 AM
NO RATINGS
GSMD , very interesting post.


Could you please tell a bit about where mcaffee security is relative to to other software stacks?

Kinnar
User Rank
CEO
Benefit of Being since long in Computing environment
Kinnar   9/11/2013 12:02:18 PM
NO RATINGS
Getting better opportunities on the security and embedded internet stack because of very long stay in the computing environment will be a very good plus point for Intel on getting proven in IoT Processor segment.

CharlieCL
User Rank
Rookie
Re: Must be 32 bit
CharlieCL   9/11/2013 12:59:32 PM
NO RATINGS
Quark is 32-bit Pentium based ISA with single Core, single Thread.

rick merritt
User Rank
Blogger
Re: Must be 32 bit
rick merritt   9/11/2013 5:44:33 PM
NO RATINGS
@GSMD: Thanks for weighing in!

Question: Doesn't the x86 support the same hardware root of trust the Trusted Computing Group nspecified and ARM Trustzone implmewnts in its own way?

 

rick merritt
User Rank
Blogger
Re: Must be 32 bit
rick merritt   9/11/2013 5:45:16 PM
NO RATINGS
@CharlieCL: What's your source on this?

GSMD
User Rank
Manager
Re: Must be 32 bit
GSMD   9/11/2013 8:53:08 PM
NO RATINGS
Std Intel seecurity does not go to the level Trustzone specifies security. FS also adds its extensions to secure boot which helps. There is a reason why AMD licenses TZ and plans to put a Cortex A5 as a sec subsystem in its x86 SoC. Part of the reason is that the os security mode needed to run full Trustzone is kind of orthogonal to the ring levels of security in the std scheme of things. The issue is that security has to be thought up ground up. Adding extensions like aes-ni, no execute bit et all over a period of time does not necessarily create a cohesive security model. For example above a certain level of security level, it is preferable to have a sec functional module rather than aes extensions. that function unit can have its own isolated ram, key storage and other isolation features. Which is what FS does and which by the way is not mandated by Trustzone. If I use the main Alu's functional unit for security processing, may leak keys through cache or create other channels for information leakage.

Page 1 / 3   >   >>
Flash Poll
Radio
LATEST ARCHIVED BROADCAST
Join our online Radio Show on Friday 11th July starting at 2:00pm Eastern, when EETimes editor of all things fun and interesting, Max Maxfield, and embedded systems expert, Jack Ganssle, will debate as to just what is, and is not, and embedded system.
Like Us on Facebook

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Times on Twitter
EE Times Twitter Feed
Top Comments of the Week