Chip Security
  • Email
  • Home
  • News
  • Reports
  • Opinion
  • Tools
  • About

New DARPA Program Seeks to Reveal Backdoors and Other Hidden Malicious Functionality in Commercial IT Devices

Posted on December 7, 2012 by John in News

The Defense Advanced Research Projects Agency (DARPA) Information Innovation Office (I2O) will conduct a briefing in support of the anticipated Broad Agency Announcement (BAA) for the VET – Vetting Commodity IT Software and Firmware program. When released, the BAA will be posted on the Federal Business Opportunities (FBO) website, http://www.fedbizopps.gov, and possibly the Grants.gov website, […]

BAA, backdoor, Commodity, DARPA, Firmware, IT, program, software

Electrical testing to track fake military parts

Posted on December 5, 2012 by John in News

Counterfeit electronic components are an increasing threat to the supply chain for consumer, industrial and, more importantly, military parts. Some counterfeit parts are like counterfeit money, unauthorized copies. Other cases include mislabeled parts where parts meant for one purpose are relabeled for another by changing the part number. Specifically, parts built for consumer purposes can […]

chip, counterfeit, fake, hardware, parts, test

DOD requirement to mark parts with unique DNA

Posted on November 26, 2012 by John in News

A new anti-counterfeiting requirement from the U.S. Defense Logistics Agency (DLA) at Fort Belvoir, Va., is triggering pushback from semiconductor manufacturers, who claim the new requirement is not an appropriate cure for electronics counterfeiting, does not adequate authenticate legacy semiconductors, has not been tested adequately, and will increase semiconductor manufacturing costs.The DNA-marking mandate, which became effective on 15 November […]

Applied, chip, counterfeit, Defense Logistics Agency, DLA, DNA, DOD, IC, marking, miltary

Toshiba adds IP protection to automotive MCUs

Posted on November 26, 2012 by John in News

Toshiba has revealed a security module for automotive microcontrollers meeting industry anti-hacking, anti-tamper and software theft standards. Developed at the company’s automotive development centre in Düsseldorf, the Toshiba Security Module will be built into future generations of the company’s ARM Cortex-based automotive microcontrollers. “The module’s firmware is, as a first release step, compliant with the Secure […]

ARM, automotive, chip, IC, Security, Toshiba

Report calls China biggest cyberthreat

Posted on November 15, 2012 by John in News

Ongoing Chinese cyberattacks on U.S. industry and government present a significant threat and the Defense Department should consider its ability to exclude “any foreign-produced equipment” that could pose cybersecurity vulnerabilities, a new report to Congress recommended Wednesday. The bipartisan U.S.-China Economic and Security Review Commission, in its annual report to Congress released Wednesday, found that China is […]

China, congress, cyberthreat, Huawei, report, ZTE

Huawei, Altera mix FPGA, memory in 2.5-D device

Posted on November 14, 2012 by John in News

Huawei and Altera will package an FPGA and a Wide I/O memory on a 2.5-D silicon interposer to bust through memory bandwidth limits in communications systems. The technology presents thorny challenges but could become critical in networking, said a senior scientist for Huawei. The new device, in the works only about three months, will significantly […]

2.5 D, 2.5D, Altera, Huawei, Interposer, networking, trojan

Morning Bell: Cybersecurity: Do You Trust the Government with Your Computer?

Posted on November 14, 2012 by John in News

“…Simply put, government regulations usually take 24–36 month to complete, but the power of computers doubles every 18–24 months. This means that any standards developed will be written for threats that are two or three computer generations old….” via Morning Bell: Cybersecurity: Do You Trust the Government with Your Computer?. Editor’s note: The government seems […]

bill, cybersecurity, executive, government, order

Fake tech gear has infiltrated the U.S. government

Posted on November 13, 2012 by John in News

A record number of tech products used by the U.S. military and dozens of other federal agencies are fake. That opens up a myriad of national security risks, from dud missiles to short-circuiting airplane parts to cyberespionage. Despite laws designed to crack down on counterfeiters, suppliers labeled by the U.S. government as “high risk” are […]

chips, fake, military, US

NIST spells out baseline security requirements for next-gen mobile devices

Posted on November 13, 2012 by John in News

Necessary, but sufficient? From Government Computer News: “The adoption of mobile devices in the workplace has outstripped the ability of smart phones and tablets to support basic security features needed in trusted enterprise tools. As a result, government agencies are being forced to accept the security risks inherent in mobile devices because their workers expect to […]

devices, hardware, mobile, risk, Security

Twitter Password Security Breach

Posted on November 8, 2012 by John in News

Twitter sent out e-mails to some of its users earlier today prompting them to reset their passwords because of possible security issues with third-party applications. “Twitter believes that your account may have been compromised by a website or service not associated with Twitter,” the e-mail says. “We’ve reset your password to prevent others from accessing […]

Breach, password, Security, twitter
  • 1
  • 2
  • 3
  • ›
  • »

Recent Posts

  • Design for Security: Needed More than Ever
  • New DARPA Program Seeks to Reveal Backdoors and Other Hidden Malicious Functionality in Commercial IT Devices
  • Electrical testing to track fake military parts
  • DOD requirement to mark parts with unique DNA
  • Toshiba adds IP protection to automotive MCUs

Recent Comments

    (c) 2012 Chip Security - Web Design by Blue Mustang