What it takes to secure an SoC

In the era of Internet-of-Things (IoT), security has become one of the most vital parts of a SoC. Secured SoCs are used to provide authentication, confidentiality, integrity, non-reproduction, and access control to the hardware and software.

This article from Freescale outlines the four key functionalities (Secure Booting, Secure Memory, Run time data integrity check, and Central security breach response) to develop a secure system.

Read More

2015-09-21T07:50:22+00:0021st September, 2015|Blog, Thought Leadership|