Security the Google Way
The latest RISC-V workshop was held at Google. In the middle of the day, there was an interesting presentation by Eric Grosse. He used to be VP of security at Google but he has recently returned to more hands-on engineering work. His talk was titled Trust, Transparency, and Simplicity.
Eric got an awakening in December 2009 when it became clear that Google had been hacked by the Chinese military. This became known as Operation Aurora (Google was not the only company targeted, others like Juniper Networks and Morgan Stanley were, too). Eric's first tenet is that you need to know your adversary. Some nation states are extremely competent, he said, but even the less competent can still cause trouble. His list was China, Russia, the "5 Eyes"—Australia, Canada, New Zealand, the United Kingdom, and the United States—and the "friendly" states like Korea and France. Even Syrian rebels, who are not that good but "good enough."
To read the full article, click here
Related Semiconductor IP
- 64 bit RISC-V Multicore Processor with 2048-bit VLEN and AMM
- RISC-V AI Acceleration Platform - Scalable, standards-aligned soft chiplet IP
- 32 bit RISC-V Multicore Processor with 256-bit VLEN and AMM
- All-In-One RISC-V NPU
- ISO26262 ASIL-B/D Compliant 32-bit RISC-V Core
Related Blogs
- A Fast and Seamless Way to Burst to the Cloud for Peak EDA Workloads
- Ensuring Integrity: The Role of SoC Security in Today's Digital World
- Exploring the Security Framework of RISC-V Architecture in Modern SoCs
- Why SRAM PUF Technology Is the Bedrock of Dependable Security in Any Chip
Latest Blogs
- How fast a GPU do you need for your user interface?
- PCIe 6.x and 112 Gbps Ethernet: Synopsys and TeraSignal Achieve Optical Interconnect Breakthroughs
- Powering the Future of RF: Falcomm and GlobalFoundries at IMS 2025
- The Coming NPU Population Collapse
- Driving the Future of High-Speed Computing with PCIe 7.0 Innovation