Locking Down Intellectual Property in Embedded Systems
Phil Giordano and Wassim Bassalee, Analog Devices
(08/21/2007 12:15 AM EDT) -- EE Times
Embedded systems developers want to protect their intellectual property (IP) for financial, competitive, and legal reasons. Aside from protecting their own IP, developers may be obligated to secure libraries or rights managed content obtained from an outside vendor. Failing to protect the IP of outside vendors may expose developers to legal and financial risks.
This article focuses on methods of securing IP in embedded systems. We will examine past and current approaches and look ahead to new embedded processing solutions that offer new options for developers wanting to protect their IP.
Techniques for protecting IP in embedded systems vary greatly. These techniques rely on software, hardware, or a combination of both to prevent reverse engineering and IP theft.
(08/21/2007 12:15 AM EDT) -- EE Times
Embedded systems developers want to protect their intellectual property (IP) for financial, competitive, and legal reasons. Aside from protecting their own IP, developers may be obligated to secure libraries or rights managed content obtained from an outside vendor. Failing to protect the IP of outside vendors may expose developers to legal and financial risks.
This article focuses on methods of securing IP in embedded systems. We will examine past and current approaches and look ahead to new embedded processing solutions that offer new options for developers wanting to protect their IP.
Techniques for protecting IP in embedded systems vary greatly. These techniques rely on software, hardware, or a combination of both to prevent reverse engineering and IP theft.
To read the full article, click here
Related Semiconductor IP
- JESD204E Controller IP
- eUSB2V2.0 Controller + PHY IP
- I/O Library with LVDS in SkyWater 90nm
- 50G PON LDPC Encoder/Decoder
- UALink Controller
Related Articles
- Intellectual property security: A challenge for embedded systems developers
- Role of Embedded Systems and its future in Industrial Automation
- From I2C to I3C: Evolution of Two-Wire Communication in Embedded Systems
- Intellectual property adolescence
Latest Articles
- System-Level Isolation for Mixed-Criticality RISC-V SoCs: A "World" Reality Check
- CVA6-CFI: A First Glance at RISC-V Control-Flow Integrity Extensions
- Crypto-RV: High-Efficiency FPGA-Based RISC-V Cryptographic Co-Processor for IoT Security
- In-Pipeline Integration of Digital In-Memory-Computing into RISC-V Vector Architecture to Accelerate Deep Learning
- QMC: Efficient SLM Edge Inference via Outlier-Aware Quantization and Emergent Memories Co-Design