Arm Community
Site
Search
User
Site
Search
User
Community Management
Archive
2021 IA Reorg Archive
Developer Community
IP Products
Security
Jump...
Cancel
Security
Help
Jump...
Cancel
New
Blogs
Latest Blogs
By date
By view count
By comment count
Descending
Ascending
Securing Small-Business and Home IoT Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)
Charlotte Christopherson
Arm Research is collaborating with NIST in the National Cybersecurity Center of Excellence (NCCoE) on Mitigating IoT-Based DDoS to develop practical, interoperable cybersecurity approaches that address…
May 14, 2019
Silicon Labs’ multiprotocol Series 2 wireless platform adds cutting-edge security
Kobus Marneweck
Read more about Silicon Labs Arm Cortex-M33 based low-power wireless family with support for Bluetooth 5.1, Zigbee 3.0 and Thread.
April 25, 2019
Anchoring TrustZone with SRAM PUF
Marten van Hulst
Let's take a look at how SRAM PUF, enabled through software, is a powerful addition to the security features offered by Arm TrustZone.
April 23, 2019
Arm Compiler 6.12: Bringing in security and improved performance
Peterson Quadros
The new Arm Compiler 6.12 achieved the highest 4.02 CoreMarks/MHz on a Cortex-M33. New features include stack protection, global named register variables and Neoverse, Cortex-A65AE and Helium support.…
April 11, 2019
The Role of Physical Security in IoT
Kobus Marneweck
Physical security, also known as silicon or hardware security, involves securing the silicon element of a system. This blog explores the different physical attacks and Arm IP on offer as a counter-measure…
March 14, 2019
Be the next speaker at Arm TechCon 2019
Elan Tanzer
Arm is pleased to announce the opening of the Call for Papers for its international event Arm TechCon taking place October 8-10, 2019.
March 5, 2019
Hardware Side-Channels: Can Performance and Security Coexist?
Ilias Vougioukas
The year 2018 will be remembered in computing history for the discovery of the Spectre and Meltdown exploits. With understandable focus in this domain from both academia and industry, we ask whether security
February 20, 2019
Securing the Smart Lighting Industry
Aniruddha Deodhar
Smart Lighting can provide a safe and comfortable environment that provides real time insights for inhabitants, but only if it’s secured. Find out how you can make security the foundation of your lighting…
January 16, 2019
Five Steps to Successful Threat Modelling
Suresh Marisetty
To build security into devices analysis of risk and vulnerabilities need to be considered. This is done through Threat Modelling, the first stage of Arm Platform Security Architecture. Learn how to carry…
January 10, 2019
Fast, secure file systems for autonomous vehicles from Tuxera
Tiffiny Rossi
The amount of data generated by connected cars is rapidly growing to over 300 TB per year. At the same time, automotive systems are increasingly exposed to the connectivity needed to make cars smarter…
January 3, 2019
Testing crypto performance and power consumption
Hannes Tschofenig
With the release of the SecureMark-TLS benchmark by the
Embedded Microprocessor Benchmark Consortium
(EEMBC) this summer, it is now possible to gather information about the performance and power consumption…
December 20, 2018
Why you need a tailored secure foundation at the heart of your next IoT product
Mike EFTIMAKIS
Arm secure foundations and Corstone foundation IP make it easier, cheaper and faster for designers to build secure SoCs. Find out more in this blog.
October 15, 2018
New CryptoCell Security IP reduces Time-to-Market and meets Chinese Crypto Standards
Udi Maor
New Arm CryptoCell Security IP provides a number of benefits to meet complex security challenges, including reducing Time-to-Market for Arm's partners and meeting Chinese Crypto Standards.
October 11, 2018
NXP enhances embedded security and signal processing with new Arm Cortex-M33 based chip families
Kobus Marneweck
NXP announces two new chip families based on the Arm Cortex-M33 processor, one of the first Cortex-M processors with TrustZone security technology, bringing a new level of trust to embedded systems.
October 10, 2018
2018 Arm TechCon Innovation Awards Finalists Named
Brian Fuller
We announce the finalists in the 2018 Arm TechCon Innovations Awards. The Innovation Awards celebrate the spirit of invention and Arm-based electronics design in the Arm ecosystem
October 10, 2018
Dealing with Security Threats: Trusted Execution Challenges in Mobile and Beyond
Udi Maor
As more people use their mobile devices for a range of everyday online tasks, from shopping to banking, the security threat to smartphones and other connected devices is only likely to increase.
October 4, 2018
Machine learning is a huge part of my life – but I didn’t realize this until I joined Arm
Jack Melling
Being over four months into my new job at Arm, I'm still learning about the company and all the many areas of technology that we're involved in. One of these areas is machine learning (ML).
October 1, 2018
New FIPS 140-2 certification provides time savings for Arm security partners
Udi Maor
Security is a top priority for the technology industry, especially now mobile devices are used for payment and hold valuable private information. FIPS 140-2 is one of the many standards providing this…
September 18, 2018
Arm A-Profile Architecture Developments 2018: Armv8.5-A
Matthew Gretton-Dann
This blog discusses some of the key additions to the A-Profile architecture in 2018 – known collectively as Armv8.5-A. This blog discusses some of the key additions to the A-Pro...
September 17, 2018
Enhancing embedded device security with new TrustZone-enabled microcontrollers
Kobus Marneweck
The introduction of Nuvoton’s M2351 microcontroller, including the Arm Cortex-M23 processor brings a new level of trust and security to embedded systems.
September 10, 2018
Architecting a more Secure world with isolation and virtualization
Berenice Mann
Arm has introduced Secure EL2, which provides mechanisms to isolate secure payloads from each other and from the Normal world. Leveraging this technology requires new thinking in security software architecture…
August 6, 2018
<
>