Software IP Protection in a Complicated World
Securing intellectual property in age of open source
Mark Warren, Perforce Software
EETimes (7/28/2015 00:13 AM EDT)
With software becoming a competitive differentiator even in hardware designs, it is important to use behavioral analytics tools that protect proprietary software IP from theft.
Securing intellectual property (IP) and confidential product data is quickly becoming a challenge for many organizations, particularly those in the electronics manufacturing industry, where hardware design increasingly involves open source software.
All indications are that IP theft is on the rise. Just one example is the long-running lawsuit between a U.K. defense contractor, Meggitt, and its former employee who allegedly stole sensor specifications. It’s hard to obtain precise numbers because few companies want to publicize their weaknesses and losses, but according to research by security firm Kaspersky Lab, one in five manufacturing firms reported a loss of IP in 2014. And a recent Vormetric Insider Threat Report found that 89 percent of global senior business managers and IT professionals surveyed felt that their organizations were now more at risk from an insider attack than ever before.
To read the full article, click here
Related Semiconductor IP
- NPU IP Core for Mobile
- NPU IP Core for Edge
- Specialized Video Processing NPU IP
- HYPERBUS™ Memory Controller
- AV1 Video Encoder IP
Related White Papers
- HIPR: Hardware IP Protection through Low-Overhead Fine-Grain Redaction
- Embedded Systems -> 'Protection domains' raise integrity
- Methodology for protection and Licensing of HDL IP
- Video content protection using secure embedded non-volatile memory for HDMI with HDCP
Latest White Papers
- Breaking the Memory Bandwidth Boundary. GDDR7 IP Design Challenges & Solutions
- Automating NoC Design to Tackle Rising SoC Complexity
- Memory Prefetching Evaluation of Scientific Applications on a Modern HPC Arm-Based Processor
- Nine Compelling Reasons Why Menta eFPGA Is Essential for Achieving True Crypto Agility in Your ASIC or SoC
- CSR Management: Life Beyond Spreadsheets