As if delivering optimal power, performance and area weren’t challenging enough, today’s designers must now also build security into their SoCs. Protecting against system attacks requires robust countermeasures, which need to be triggered at the processor IP level. This session will focus on methods to defend against logical and physical attacks that minimize impact to area and power. Special attention will be given to developing a trusted execution environment, countermeasures for side-channel analysis (SCA) attacks, and cryptography implementation options.

Attendees will learn:

  • Basics of developing a trusted execution environment on an ultra-low power core to share system resources for secure and normal processing
  • Understanding side channel analysis attacks and processor-level defense mechanisms
  • Cryptographic implementation trade-offs


Ruud Derwig, Software and Systems Architect, Synopsys

Ruud Derwig has 20+ years of experience with software and system architectures for embedded systems. Key areas of expertise include (real-time, multi-core) operating systems, media processing, component based architectures, and security. He holds a master’s degree in computing science and a professional doctorate in engineering from Eindhoven University of Technology, the Netherlands. Ruud started his career at Philips Corporate Research, worked as a Software Technology Competence Manager at NXP Semiconductors, and is currently a software and systems architect at Synopsys.