close By using this website, you agree to the use of cookies. Detailed information on the use of cookies on this website can be obtained on OneSpin's Privacy Policy. At this point you may also object to the use of cookies and adjust the browser settings accordingly.

Who’s Responsible For Security Breaches? | Experts at the Table, Part 2

By Brian Bailey, Semiconductor Engineering | Feat. David Landoll, Solutions Architect, OneSpin

How are we dealing with security threats, and what happens when it expands to a much wider network?

Semiconductor Engineering sat down to discuss industry attitudes towards safety and security with Dave Kelf, chief marketing officer for Breker Verification; Jacob Wiltgen, solutions architect for functional safety at Mentor, a Siemens Business; David Landoll, solutions architect for OneSpin Solutions; Dennis Ciplickas, vice president of characterization solutions at PDF Solutions; Andrew Dauman, vice president of engineering for Tortuga Logic; and Mike Bartley, CEO for TV&S. What follows are excerpts of that conversation.

[...]

Landoll: But when you are looking at hardware, there are a finite number of ways. Yes, it is a huge number, but it is finite. You can basically take the RTL, or the gate-level netlist, and you can extract all of the possible ways it can fault. You can analyze every one of them. From a software perspective, you can’t. But at least if you can get a handle on the hardware, then it reduces the chance.

Back

Related Links