Security the Google Way
The latest RISC-V workshop was held at Google. In the middle of the day, there was an interesting presentation by Eric Grosse. He used to be VP of security at Google but he has recently returned to more hands-on engineering work. His talk was titled Trust, Transparency, and Simplicity.
Eric got an awakening in December 2009 when it became clear that Google had been hacked by the Chinese military. This became known as Operation Aurora (Google was not the only company targeted, others like Juniper Networks and Morgan Stanley were, too). Eric's first tenet is that you need to know your adversary. Some nation states are extremely competent, he said, but even the less competent can still cause trouble. His list was China, Russia, the "5 Eyes"—Australia, Canada, New Zealand, the United Kingdom, and the United States—and the "friendly" states like Korea and France. Even Syrian rebels, who are not that good but "good enough."
To read the full article, click here
Related Semiconductor IP
- 64 bit RISC-V Multicore Processor with 2048-bit VLEN and AMM
- RISC-V AI Acceleration Platform - Scalable, standards-aligned soft chiplet IP
- 32 bit RISC-V Multicore Processor with 256-bit VLEN and AMM
- All-In-One RISC-V NPU
- ISO26262 ASIL-B/D Compliant 32-bit RISC-V Core
Related Blogs
- Why SRAM PUF Technology Is the Bedrock of Dependable Security in Any Chip
- Cadence Leads the Way at PCI-SIG DevCon 2025 with Groundbreaking PCIe 7.0 Demos
- How Chip Startups Are Changing the Way Chips Are Designed
- The Evolution of CXL.CacheMem IDE: Insights into CXL3.0 Security Feature
Latest Blogs
- CNNs and Transformers: Decoding the Titans of AI
- How is RISC-V’s open and customizable design changing embedded systems?
- Imagination GPUs now support Vulkan 1.4 and Android 16
- From "What-If" to "What-Is": Cadence IP Validation for Silicon Platform Success
- Accelerating RTL Design with Agentic AI: A Multi-Agent LLM-Driven Approach