Fullmoonfever
Top 20
Well....recent article ARM identifying security issues with auto applications....hmmmm...what may help fix some of those....that's right....one shot on chip learning / processing rather than connected all times
Arm's automotive partnership in the APAC region senior director Simon Teng. Photo: DIGITIMES
The rising demand for automotive applications has compelled Arm to recognize the need for novel architectures for protecting automotive IC security, said Simon Teng, senior director of the company's automotive partnership in the APAC region.
Over the past few years, there has been a significant increase in the demand for advanced driver assistance system (ADAS), autonomous driving, and information security tools. As a supplier of IC design architectures, Arm is aware of the importance of consolidating chip security, Teng said.
There are too many weak spots susceptible to cyberattacks in a car, such as digital keys, maintenance holes, GPS and bluetooth signal transmitters, AI models, hundreds of microcontroller units (MCU) and related applications, he said.
Once a hacker finds a loophole, they will be able to penetrate through the interconnected systems, he said.
The priority is to consolidate the "root of trust" of foundational hardware, and standardized architectures are needed to complete foundational protection, Teng said.
Arm will collect more information about which technologies need stronger security protection and develop common security standards that can be used by automotive suppliers to defend against complex security challenges, he said.
For the automotive and IoT security sectors, Arm has devised four strategies, he said.
Processors should be built with proper instruction set architecture to defend against malware; processors and memory devices should be able to discern varied levels of security risks, so ordinary data will be put in a non-security zone, while sensitive data about driving behaviors and individual drivers will be stored in a trust zone that can operate independently, he said.
Arm's common security platform allows security and non-security zones to maintain communications, he added.
Arm's widely used CPU and systems can be regarded as the pillars of the technology industry, so its information security standards for application programming interfaces will reduce fragmentation of data while improving security levels, Teng said.
The information security of applications is predicated on foundational hardware security, which is crucial for Taiwanese companies to cut into the global automotive supply chain, Teng said.
Actually picked up the above article from these guys who also had the BRN Si Five news as well. Seems they in the industry too haha.
Foundational security key to automotive applications
The rising demand for automotive applications has compelled Arm to recognize the need for novel architectures for protecting automotive IC security, said Simon Teng, senior director of the company's automotive partnership in the APAC region.
www.digitimes.com
Foundational security key to automotive applications
Louise Lu, Taipei; Ines Lin, DIGITIMESThursday 5 May 20220Arm's automotive partnership in the APAC region senior director Simon Teng. Photo: DIGITIMES
The rising demand for automotive applications has compelled Arm to recognize the need for novel architectures for protecting automotive IC security, said Simon Teng, senior director of the company's automotive partnership in the APAC region.
Over the past few years, there has been a significant increase in the demand for advanced driver assistance system (ADAS), autonomous driving, and information security tools. As a supplier of IC design architectures, Arm is aware of the importance of consolidating chip security, Teng said.
There are too many weak spots susceptible to cyberattacks in a car, such as digital keys, maintenance holes, GPS and bluetooth signal transmitters, AI models, hundreds of microcontroller units (MCU) and related applications, he said.
Once a hacker finds a loophole, they will be able to penetrate through the interconnected systems, he said.
The priority is to consolidate the "root of trust" of foundational hardware, and standardized architectures are needed to complete foundational protection, Teng said.
Arm will collect more information about which technologies need stronger security protection and develop common security standards that can be used by automotive suppliers to defend against complex security challenges, he said.
For the automotive and IoT security sectors, Arm has devised four strategies, he said.
Processors should be built with proper instruction set architecture to defend against malware; processors and memory devices should be able to discern varied levels of security risks, so ordinary data will be put in a non-security zone, while sensitive data about driving behaviors and individual drivers will be stored in a trust zone that can operate independently, he said.
Arm's common security platform allows security and non-security zones to maintain communications, he added.
Arm's widely used CPU and systems can be regarded as the pillars of the technology industry, so its information security standards for application programming interfaces will reduce fragmentation of data while improving security levels, Teng said.
The information security of applications is predicated on foundational hardware security, which is crucial for Taiwanese companies to cut into the global automotive supply chain, Teng said.
Actually picked up the above article from these guys who also had the BRN Si Five news as well. Seems they in the industry too haha.
News & Events -DayStar Electric Technology 乾一科技
Daystar Electric Technology Co., Ltd was established in 2006, starting from operating small and medium-sized LCM and LCD display parts and other related display parts, growing year by year, becoming the industry's leading provider of professional display parts solutions and provides customized...
www.daystar-elec.com