Welcome Guest

Balancing Advanced SoC Security Requirements with Constrained Area and Power Budgets

Original Air Date: Oct 25, 2016 Webinar
0
0 0 View


    Please disable any pop-up blockers for proper viewing of this webinar.

More Info Less Info

As if delivering optimal power, performance and area weren’t challenging enough, today’s designers must now also build security into their SoCs. Protecting against system attacks requires robust countermeasures, which need to be triggered at the processor IP level. This session will focus on methods to defend against logical and physical attacks that minimize impact to area and power. Special attention will be given to developing a trusted execution environment, countermeasures for side-channel analysis (SCA) attacks, and cryptography implementation options.

Attendees will learn:

  • Basics of developing a trusted execution environment on an ultra-low power core to share system resources for secure and normal processing
  • Understanding side channel analysis attacks and processor-level defense mechanisms
  • Cryptographic implementation trade-offs
Speaker

Ruud Derwig, Software and Systems Architect, Synopsys

Ruud Derwig has 20+ years of experience with software and system architectures for embedded systems. Key areas of expertise include (real-time, multi-core) operating systems, media processing, component based architectures, and security. He holds a master's degree in computing science and a professional doctorate in engineering from Eindhoven University of Technology, the Netherlands. Ruud started his career at Philips Corporate Research, worked as a Software Technology Competence Manager at NXP Semiconductors, and is currently a software and systems architect at Synopsys.

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page