Tagged articles
11 articles
Page 1 of 1
Architects' Tech Alliance
Architects' Tech Alliance
Apr 28, 2026 · Information Security

Why Compute Power Gets You In, but Security Determines Survival—HaiGuang’s Two Game‑Changing Moves

The article analyzes the rapid expansion of AI compute demand, the shift toward domestic chip dominance, emerging security threats such as data poisoning, and HaiGuang’s hardware‑level “intrinsic security” architecture—including a full‑stack cryptographic platform and a trusted data space—to make AI systems both usable and secure for critical industries.

AI computeChinese semiconductordata poisoning
0 likes · 6 min read
Why Compute Power Gets You In, but Security Determines Survival—HaiGuang’s Two Game‑Changing Moves
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Oct 10, 2025 · Information Security

How Alibaba Cloud’s PRoT810 Chip Redefines Server Hardware Security

Amid rapid cloud and AI growth, Alibaba Cloud unveiled its self‑designed PRoT810 security chip and AliPRoT module, establishing a hardware‑level platform root of trust that delivers layered, proactive defense for data‑center servers against firmware tampering, supply‑chain attacks, and operational risks.

cloud computinghardware securityplatform root of trust
0 likes · 11 min read
How Alibaba Cloud’s PRoT810 Chip Redefines Server Hardware Security
AntTech
AntTech
Sep 2, 2023 · Information Security

Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information

The announcement details a September 7 forum hosted by the China Cryptology Society, featuring eight technical talks on cutting‑edge cryptographic and data‑security technologies—including hardware security, secure GPT inference, volume‑hiding encrypted multi‑maps, end‑to‑same‑end encryption, fully homomorphic encryption databases, dishonest‑majority MPC, active privacy computing, and the Bicoptor protocol—along with speaker biographies and abstracts.

MPCcryptographydata security
0 likes · 15 min read
Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information
Liangxu Linux
Liangxu Linux
May 23, 2023 · Information Security

Protecting MCU Firmware with UDID‑Based Licensing and Encryption

The article explains how to safeguard embedded firmware by using each MCU's unique device identifier to generate per‑device licenses, outlines simple and advanced encryption methods, compares secure and regular MCUs, and introduces a production‑grade programming tool that enforces these protections.

MCUUDID licensingembedded systems
0 likes · 8 min read
Protecting MCU Firmware with UDID‑Based Licensing and Encryption
vivo Internet Technology
vivo Internet Technology
Apr 5, 2023 · Information Security

TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones

TrustZone implements a hardware‑level privacy shield for smartphones by partitioning CPU, bus, memory, peripherals and interrupts into a Secure World and a Normal World, using ARMv8 exception levels and extensions such as SCR, TZPC, TZASC, GIC and MMU to isolate user data from non‑secure software.

ARM SecurityMobile SecurityTEE
0 likes · 12 min read
TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Sep 16, 2022 · Information Security

Overview of TrustZone‑Based SoC Components and CryptoCell Architecture

The article outlines ARM TrustZone‑enabled SoC components and the CryptoCell architecture, describing its two product families (700 and 300), hardware modules for symmetric and asymmetric cryptography, secure key slots, the CRYS software library, and their roles in secure‑boot, lifecycle management, debugging and data protection.

ARMCryptoCellSOC
0 likes · 8 min read
Overview of TrustZone‑Based SoC Components and CryptoCell Architecture
Efficient Ops
Efficient Ops
Sep 14, 2022 · Operations

Why Hardware-Based Remote Management Beats Software Solutions for Digital Transformation

The article explains how enterprises facing digital transformation challenges can achieve more reliable and secure IT operations by adopting hardware‑based remote management like Intel vPro, which works even when operating systems fail, and how combining hardware and software creates a robust solution for smart manufacturing.

Intel vProRemote Managementhardware security
0 likes · 8 min read
Why Hardware-Based Remote Management Beats Software Solutions for Digital Transformation
Architects' Tech Alliance
Architects' Tech Alliance
Aug 24, 2021 · Fundamentals

A New Golden Age for Computer Architecture: Trends, Challenges, and Opportunities

This article reviews the evolution of computer architecture, discusses the end of Dennard scaling and Moore’s law, highlights the rise of domain‑specific and RISC‑V designs, examines security challenges, and outlines future opportunities for more efficient, open, and agile hardware solutions.

RISC-Vagile hardware developmentdomain-specific architectures
0 likes · 41 min read
A New Golden Age for Computer Architecture: Trends, Challenges, and Opportunities
21CTO
21CTO
Aug 8, 2020 · Information Security

What Intel’s 20 GB Source Code Leak Reveals About Firmware Security

On August 6, a Swiss engineer uploaded roughly 20 GB of Intel’s internal firmware source code and confidential documents to a public file‑sharing site, prompting Intel to investigate the breach, deny a backdoor, and attribute the leak to a privileged user of its Resource and Design Center.

Intelfirmwarehardware security
0 likes · 6 min read
What Intel’s 20 GB Source Code Leak Reveals About Firmware Security
Architects' Tech Alliance
Architects' Tech Alliance
May 16, 2020 · Information Security

Understanding Secure Boot, Trusted Boot, Intel SGX, and ARM TrustZone

This article explains the concepts of secure boot and trusted boot, discusses their limitations on general-purpose devices, and compares the application workflows and security properties of Intel SGX and ARM TrustZone, highlighting practical usage scenarios such as DRM-protected media.

Intel SGXSecure Bootarm trustzone
0 likes · 10 min read
Understanding Secure Boot, Trusted Boot, Intel SGX, and ARM TrustZone