When the University of Michigan partnered with Arm Research on a project for DARPA, there was a remaining technical gap the team needed to bridge, and Arm Research knew the ideal partner.
Arm and VMware are bringing three powerful CNCF projects (SPIFFE, SPIRE and PARSEC) to show how cloud-native workloads can access the best hardware security facilities of any platform at the Cloud Native…
In this blog, Masaaki Tokuyama, Founder & CEO, AnchorZ Inc. describes a different approach to device security by using biometrics combined with user behavior.
Operational semantics are a precise, mathematical description of how a storage system should behave, and parametric in the choice of the consistency model.
In this blog, read about how Arm Research is working with the U.S. Defense Advanced Research Projects Agency (DARPA) on the Automatic Implementation of Secure Silicon (AISS) program.
Following many years of collaboration on a range of research projects, Arm Research and the University of Bristol have established an Arm Centre of Excellence. Six months in, the Centre of Excellence is…
Follow a working example of IoT security using a smart door lock. Learn how the Platform Security Architecture (PSA) framework provides a practical way to design-in security to connected devices.
Learn how to validate your IoT system with PSA and MDK in this Arm tutorial. API test, timing verification, and power analysis enable secure, low-power IoT end nodes.
GuardKnox is at the forefront of the automotive shift to generate in-vehicle high-performance computing platforms for security. Find out how they are innovating with a flexible and scalable electronic…
How does a developer prevent an attacker from taking control of a program when the developer is providing the tools to the attacker? This blog post answers these questions and demonstrates how compilers…
In 2016, SoftBank founder and CEO Masayoshi Son took to the Arm TechCon stage to paint a bold vision of a world of a trillion connected devices. It’s a goal the industry has worked feverishly toward ever…
The use of IoT devices is accelerating at a rapid pace, driven by the ongoing digital transformation. With the prediction of a trillion connected devices by 2035 and the growth of the big data, security…
Arm Research is collaborating with NIST in the National Cybersecurity Center of Excellence (NCCoE) on Mitigating IoT-Based DDoS to develop practical, interoperable cybersecurity approaches that address…
Threat modelling is a process many follow when designing products, but in the IoT space it's still a unique concept. This blog looks at the importance of threat modelling and why you should care about…