Archive For May, 2012

7 articles

Identifying Backdoors in Production-Ready Code

By Ido Sarig The security world is abuzz with news about a “backdoor” - undocumented  access to its programmatic interface -  found in a popular FPGA manufactured in China and used in US military applications. Whether you are concerned that this is a deliberate Chinese plot to attack Western militaries, or relieved to hear that this is just a "common" backdoor,…

Teaching Networking using Simics

By Jakob Engblom Wind River Education Services provides user training for a variety of topics, including Wind River operating systems and tools, as well as more general topics like networking. Training always includes hands-on labs, which can complicate logistics for training sessions. Shipping boards and configuring networks is time-consuming and error-prone. For that reason, we are looking into using Simics as…

Got DPDK? We Can Help You!

By Glenn Seiler If you’ve purchased a communications processor from Intel in the last year, there is a strong likelihood you are familiar with the Intel® Data Plane Development Kit. Intel DPDK, as it is commonly referred to here at Wind River, is a set of libraries that help applications transmit and receive packet data as efficiently as possible on…

Securing Android for the Battle Space

By Tim Skutt Armed conflict has radically changed.  Remotely operated unmanned vehicles and cyber warfare highlight this change.  Combatants can launch an attack anywhere from a few hundred meters away to half a world away with the same devastating results.  One of the fascinating – and scary – parts of this change is that the trigger firing the weapon has…

Diab Compiler Adding Support for new Infineon TriCore AURIX Microcontrollers

By Graham Morphew Infineon Technologies recently announced their next generation family of 32-bit TriCore™ microcontrollers for automotive applications.  The new architecture is called AURIX™ (AUtomotive Realtime Integrated neXt generation architecture) and it supports multi-core architectures of up to three independent TriCore CPUs.  The feature set of this new AURIX family is a perfect match for powertrain applications, electric vehicles as well as steering, braking,…

Security Regulations and the Public/Private Relationship

By AJ Shipley Last week the U.S. House of Representatives passed a cyber-security bill and sent it on to the Senate.  This got me thinking, what is government’s role in regulating the security requirements of our nation’s critical infrastructure?  Security's primary goal is to establish a trusted relationship and protect people, products, and services from un-authorized or malicious intent.  When…

Forcing Rare Bugs to Appear – an Interview with Tingting Yu

By Jakob Engblom One use of Simics that has always been fascinating is to use the power you have over the target to somehow force error conditions in software. The hardware state control inherent in a tool like Simics should be useful to knock a system off of the expected common path and into code less tested, and to reveal…