How Secure Is Your USB?
Nick Flaherty, EETimes
9/8/2014 11:23 AM EDT
The recent report from researchers at Security Research Labs on the vulnerability of USB devices has seen equal amounts of soul searching and indignation from the industry. While the advice has been to make sure you use devices from trusted sources, some USB IP companies have been highlighting what device makers can do to ensure that their systems are secure.
Rather than use malware on a USB device, SR Labs researchers Karsten Nohl and Jakob Lell reverse-engineered the code in the USB controllers and used it to inject a virus or trojan into a system.
Gordon Lunn, customer engineering support manager at Glasgow, UK-based USB chip IP developer FTDI Chip, points out that the report highlights programmable devices, which are just one type of USB device.
To read the full article, click here
Related Semiconductor IP
- USB 1.1 PHY, Support Low Speed and Full Speed - HLMC 55nm
- USB 1.1 PHY, Support Low Speed and Full Speed - HHGrace 110nm
- Verification IP for USB
- USB 2.0 Audio Devices Design Platform
- USB 2.0 Human Interface Devices Design Platform
Related News
- TSMC 12FFC silicon proven SERDES Phy IPs' for HDMI 2.1, PCIe Gen5, DDR4, USB 4 & MIPI Interfaces available immediately for your next SoC
- QuickLogic Launches Qomu - an Open Source SoC Dev Kit That Fits in Your USB Port
- USB 3.0/ PCIe 3.0/ SATA 3.0 Combo PHY IP in 12nm, 16nm and 22nm process nodes with simple integration and flexible customization is ready for immediate licencing for your advanced SoC design
- The Art of Predictability : How Axiomise is Making Formal Verification Mainstream
Latest News
- Jim Keller: ‘Whatever Nvidia Does, We’ll Do The Opposite’
- FlexGen Streamlines NoC Design as AI Demands Grow
- IntoPIX Presents Its New Titanium Software Suite: Empowering AV-Over-IP Workflows With Speed, Quality & Interoperability
- Global Semiconductor Sales Increase 2.5% Month-to-Month in April
- Speedata Raises $44M to Launch First-Ever Chip Designed Specifically for Accelerating Big Data Analytics - Compute's Second Largest Workload