Design Con 2015
Breaking News
Comments
Oldest First | Newest First | Threaded View
daleste
User Rank
CEO
hard sell
daleste   8/22/2013 10:23:34 PM
NO RATINGS
Yes, security is a hard sell to people that have not had any problems.  The same can be said for a home security system.  Once you have a friend that has had a break in, you will be more likely to get your own security system.  Once you have had a break in, you will get one immediately and berate yourself for not doing it sooner.

Kinnar
User Rank
CEO
Embedding security in embedded systems
Kinnar   8/23/2013 6:36:49 AM
NO RATINGS
Embedding security in embedded system is really a need of electronic industry, as the embedded elements grows and average awareness about the open source boards and embedded OS is spreading more among the users, it is likely to be more offending to the manufacturers as it will be draining/leaking the business of providing support and services.

prabhakar_deosthali
User Rank
CEO
embedding security should be legally binding
prabhakar_deosthali   8/23/2013 8:19:35 AM
NO RATINGS
The security becomes utmost important when we talk about connected cars, driver-less cars, internet of things and such systems which will supposedly work without human intervention. Without a foolproof built-in security these systems could create havoc which we  legally will not be able to pin point to a person.

The initiative by US labs is a move in right direction and by having security standards as mandatory in all of these systems the govt should encourage commercializing of such technologies.

rick merritt
User Rank
Author
Sizing up the tech
rick merritt   8/23/2013 2:21:36 PM
NO RATINGS
I'd be interested in hearing -- particularly from anyone who attended --an assesment of the usefulness of the eight technologies they showcased.

 

rick merritt
User Rank
Author
DHS on your radar
rick merritt   8/23/2013 2:22:46 PM
NO RATINGS
Is DHS a key point of contact for security researchers out there? Could they be?

theroc66
User Rank
Rookie
Re: Sizing up the tech
theroc66   8/23/2013 3:06:19 PM
NO RATINGS
Hi Rick. Usefulness of the hardware based security architecture seems to making huge strides: Microsoft just implemented it by default in the new Win8 RT OS, and has announced their new enterprise offering will be greatly relying on the new level of security this architecture enable - especially in the area of mobile connection to enterprise networks, based on dual factor authentication.

For those looking to learn more about the space, check the upcoming Trusted Computing Conference this coming September: the list of sponsoring companies - MSFT, CSCO, WAVX...- and the quality of the expected speakers seems very promising.

This new paradigm in "built-in" security seems about to be rolled out by heavy weights. To be looked at!

AR.

rick merritt
User Rank
Author
Re: Sizing up the tech
rick merritt   8/26/2013 10:59:24 AM
NO RATINGS
@theroc66: It's about time Microosft implmented the TCG specs! They have been around for 10+ years.

Why is Msoft only doing this with the ARM (Trustzone) implementation for RT? Not the Intel implmnetation? What's going on here I am missing?

I know they had big hopes for Palladium on Windows years ago but got pushback. Still sore?

DrQuine
User Rank
CEO
Unintended Consequences
DrQuine   8/26/2013 6:18:38 PM
NO RATINGS
Will hackers discover that rewriting their code will enable them to avoid detection by emerging malware tools? While indeed existing malware may share certain attributes, I'd expect that once the tools are known to be detecting these features, the structures will get changed.  We've already seen a hint of this trend with spam: large blocks of irrelevant "literary" text get inserted to "drown out" the spam content pattern.

[RE: "MLstones from Pacific Northwest Laboratories uses concepts and algorithms from the biology to detect malicious code. The program assumes that, as is true with proteins, code structure and its function are related in malware."]

theroc66
User Rank
Rookie
Re: Sizing up the tech
theroc66   8/27/2013 3:07:58 PM
NO RATINGS
Hi Rick,

I read a couple rumours that it will be more present in the 8.1 release due in October.

Maybe we can learn a lot more at the upcoming conference where both Msft and Trusted computing are diamond sponsors... Check the keynotes.

http://www.trustedcomputingconference.com/

Have a good one,

AR.

jaybus0
User Rank
CEO
Re: Unintended Consequences
jaybus0   9/5/2013 8:53:25 AM
NO RATINGS
Rewriting the code has always been a defense technique for malware. Virus scanners are, for the most part, simple searches for a binary pattern (signature). Modeling biology, some use an evolutionary approach to replication, purposefully introducing mutations when replicating in order to defend against pattern detectors. This was the primary reason behind implementing code execution protection into CPUs to prevent executing code built in stack or data segments by self-modifying malware.



Most Recent Comments
Flash Poll
Top Comments of the Week
Like Us on Facebook
EE Times on Twitter
EE Times Twitter Feed

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Life
Frankenstein's Fix, Teardowns, Sideshows, Design Contests, Reader Content & More
Max Maxfield

Book Review: Deadly Odds by Allen Wyler
Max Maxfield
11 comments
Generally speaking, when it comes to settling down with a good book, I tend to gravitate towards science fiction and science fantasy. Having said this, I do spend a lot of time reading ...

Martin Rowe

No 2014 Punkin Chunkin, What Will You Do?
Martin Rowe
1 Comment
American Thanksgiving is next week, and while some people watch (American) football all day, the real competition on TV has become Punkin Chunkin. But there will be no Punkin Chunkin on TV ...

Rich Quinnell

Making the Grade in Industrial Design
Rich Quinnell
14 comments
As every developer knows, there are the paper specifications for a product design, and then there are the real requirements. The paper specs are dry, bland, and rigidly numeric, making ...

Martin Rowe

Book Review: Controlling Radiated Emissions by Design
Martin Rowe
1 Comment
Controlling Radiated Emissions by Design, Third Edition, by Michel Mardiguian. Contributions by Donald L. Sweeney and Roger Swanberg. List price: $89.99 (e-book), $119 (hardcover).