Chameleon
Chameleons, the art of deception, and keeping your design away from predators

Out in the wilderness, it is a known instinct that at times the key to survival is to stay invisible. Chameleons are just one of many examples that have mastered the art of camouflage as an important tool for survival, protecting themselves against the many dangers that might bring an end to their life if they are spotted and targeted.

 

In a major leap, transfer this thought into modern chip design – where new, innovative concepts are created by bright designers who find themselves in a different struggle to survive against hackers who dedicate their passion and sophistication to steal data and even the design itself.

In a nearly Darwinian survival of the fittest, if your design can’t be protected from such hackers, it’s dead! You must not only make sure that your data is kept safe while stationary, in transit or in process, but you must protect your very design as well, avoiding third parties from performing unauthorized copies and use of your design.

 

An effective way to do this is to apply the concept of camouflage to impair the ability of predators to understand your design. If a wild wolf would look at a rabbit and see an elephant, he would surely not attempt to hunt it, as his odds would be surely against success.

 

In this paper we will show how a bit of illusion can be used to avoid unauthorized copies, and if they do happen, how to make sure that the end result of the copy is so badly damaged that it becomes useless.

May 15, 2018
Cloud watermarking to protect premium entertainment

Watermarking may be in your future as the entertainment industry trends to Ultra High Definition (UHD) content and the early release of Video On Demand movie titles just a few short weeks after their theatrical run. The watermarking of such premium video content is a new Hollywood studio requirement to prevent piracy. Following is a general explanation of the process from Inside Secure’s recent white paper “CLOUD STRATEGIES FOR THE DIGITAL THREATSCAPE”.

May 8, 2018
Wild West of Mobile Banking Security
The Wild West of Mobile Banking Security

“I don’t bank on my phone” cries out our VP for Finance, “it’s not secure!”  We must be at another industry event then – it’s a statement he regularly makes.

We’ve always believed that Mobile Banking was a wild west when it comes to security; but we wanted to test that belief with some real data. To better understand the current state of security within the mobile bank industry, UL and Inside Secure undertook joint research to give a snapshot of the industry today.

Applications were selected by a criteria designed to give an even split across geographies, and between challenger and established banks. These applications were then given to the security labs within UL and Inside Secure. The labs used automated tools and expert static analysis to score the applications.

Apr 23, 2018
BT TV Case Study
How to face the modern challenges of content protection: Case BT TV

In an effort to expand their existing online video-on-demand streaming services to include more programming to a greater UK audience, BT TV sought to leverage the investment in their existing over-the-top (OTT) infrastructure. BT TV has seen its 1.8m customer base shift from a traditional STB experience to its customers demanding more OTT and on-the-go services.

Apr 13, 2018
Interview with Cyrille Ngalle
ScreenPlays Magazine's interview with Inside Secure: "Major Advances"

As Over-the-Top (OTT) media distribution increasingly competes with traditional broadcast programming, new security and user engagement requirements are needed. Inside Secure is at the forefront of these solutions with an evolving set of technologies and functionality. This was discussed in depth during a recent interview with ScreenPlays Magazine at CES 2018.

Mar 27, 2018
Mobile World Congress 2018: Creating a More Secure Future

It’s almost mandatory to start any Mobile World Congress blog by pointing out that no-one goes to MWC anymore to see the latest mobile phones. This was doubly true this year after the big Samsung launch was leaked before the event. The leak was through an attack on their mobile app – something that is easy to defend against. I wonder what it cost them marketing pizazz.

Mar 9, 2018
  • 1 (current)
  • 2
  • 3