Security the Google Way
The latest RISC-V workshop was held at Google. In the middle of the day, there was an interesting presentation by Eric Grosse. He used to be VP of security at Google but he has recently returned to more hands-on engineering work. His talk was titled Trust, Transparency, and Simplicity.
Eric got an awakening in December 2009 when it became clear that Google had been hacked by the Chinese military. This became known as Operation Aurora (Google was not the only company targeted, others like Juniper Networks and Morgan Stanley were, too). Eric's first tenet is that you need to know your adversary. Some nation states are extremely competent, he said, but even the less competent can still cause trouble. His list was China, Russia, the "5 Eyes"—Australia, Canada, New Zealand, the United Kingdom, and the United States—and the "friendly" states like Korea and France. Even Syrian rebels, who are not that good but "good enough."
To read the full article, click here
Related Semiconductor IP
- RISC-V Display Connectivity Subsystem (DCS)
- RISC-V IOPMP IP
- RISC-V Debug & Trace IP
- Gen#2 of 64-bit RISC-V core with out-of-order pipeline based complex
- 64-bit RISC-V core with in-order single issue pipeline. Tiny Linux-capable processor for IoT applications.
Related Blogs
- Cadence Leads the Way at PCI-SIG DevCon 2025 with Groundbreaking PCIe 7.0 Demos
- How Chip Startups Are Changing the Way Chips Are Designed
- The Evolution of CXL.CacheMem IDE: Insights into CXL3.0 Security Feature
- Comcores: The One-Stop Shop for Automotive Ethernet and Security
Latest Blogs
- A Repeatable Framework for Hardware Security Assurance
- Inside the SiFive Performance™ P570 Gen 3: High Performance Efficiency for Next-Generation Consumer and Commercial Applications
- What the steam engine can teach us about modern chip design
- Automotive silicon in the era of AI, functional safety, and cybersecurity
- JPEG XS Officially Joins GenICam, The Machine Vision Standard Managed By EMVA