Mobile chips face lockdown to prevent hacks

Chipmakers are adding more security layers to protect mobile device users from malicious attacks and code injection

Chipmakers want to make hardware the first layer of defense against data breaches and other attacks on tablets and smartphones.

Mobile devices are becoming increasingly vulnerable, with more personal information, banking data, passwords and contacts residing on devices without any protection, said presenters at the Hot Chips conference in Cupertino, California.

The NSA revelations and a mounting pile of data breaches have reminded hardware makers that well-designed chips for PCs, servers and mobile devices, can minimize, if not prevent, attacks, said Leendert VanDoorn, corporate fellow at Advanced Micro Devices.

"You can't open a newspaper without reading about a security attack," VanDoorn said.

Most attacks today exploit software bugs, but it's possible for hackers to isolate keyboards, voice, sensors and even screens, snoop for information and send data back to rogue servers, said Vikas Chandra, principal engineer at ARM's research and development division.

A well-designed system can provide multiple layers to prevent malicious attacks and injection of rogue code, said Chandra, adding that the hardware, security subsystem and software on mobile hardware need to work together.

Besides ARM, chip makers like Intel and AMD are working to bring more security features so mobile devices are shielded from attacks. The companies are knitting together hardware and software to work more cohesively in a system, and also establishing hypervisors, secure boot layers, and segmented areas - much like sandboxes - in which code could be executed without compromising a system.

Most mobile device users are not tech savvy, and haven't secured devices with passwords or pins. Few devices have security software to prevent malware, and trojans running on social networking apps could collect personal information and send it back to rogue servers, he said.

ARM is improving its security layer called TrustZone to prevent such attacks, Chandra said. The layer establishes a trusted execution environment in which code can be safely executed without affecting the entire system.

The company also wants to eliminate users from having to use multifactor authentication and entering multiple passwords, Chandra said, adding that there are more secure ways to log-in to websites.

He gave the example of the FIDO authenticator, in which users can login through fingerprint scanning or face recognition. The log-in generates a private key that is encrypted, sent to a FIDO server, which then decrypts the key. That emerging technology works within TrustZone, which protects private keys.

The form of authentication is being promoted by the FIDO Alliance, which was established early last year and boasts members such as ARM, Google, Microsoft, Bank of America, MasterCard, PayPal, Samsung, Visa, Lenovo and others.

It's also important to make sure servers are ready to deal with different security layers in mobile devices and the new authentication techniques, said Ruby Lee, professor of electrical engineering at Princeton University.

"Security is not only a top to bottom issue. It's also an end to end issue," Lee said.

It's easy to account for one device, but not the other, Lee said.

"There's no use if your cloud servers are secure, but those smartphones that act as a cloud are completely insecure," Lee said.

ARM's TrustZone has put the stake in the ground for mobile platform integrity, including how to set up wireless transmissions, authentication techniques and others, Lee said.

Engineers from Intel, AMD and ARM also talked about security enhancements at the hardware layers in PCs and servers. A lot of hardware security implementations are around secure execution layers, trusted domains and securing DRAM so private keys and cryptographic data can't be stolen in transit. Intel is bringing the ability to identify rootkits and polymorphic viruses at the hardware layer to its upcoming chips so malicious attacks can be identified before they wreak havoc on a system.

Not all hardware security features in PCs and servers will come to smartphones, which have limited processing capabilities due to power constraints, Lee said.

But system design is important, and the security features need to be chosen wisely.

"It's not easy to come up with a hardware patch, so you have to think ahead," Lee said.

Agam Shah covers PCs, tablets, servers, chips and semiconductors for IDG News Service. Follow Agam on Twitter at @agamsh. Agam's e-mail address is

Join the PC World newsletter!

Error: Please check your email address.

Tags ArmFIDO AlliancesecurityAdvanced Micro Deviceshardware systems

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Agam Shah

IDG News Service
Show Comments

Cool Tech

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

D-Link PowerLine AV2 2000 Gigabit Network Kit

Learn more >

Crucial® BX200 SATA 2.5” 7mm (with 9.5mm adapter) Internal Solid State Drive

Learn more >

Xiro Drone Xplorer V -3 Axis Gimbal & 1080p Full HD 14MP Camera

Learn more >

D-Link TAIPAN AC3200 Ultra Wi-Fi Modem Router (DSL-4320L)

Learn more >

ASUS ROG Swift PG279Q – Reign beyond virtual world

Learn more >

Gadgets & Things


Learn more >

Lexar Professional 2000x SDHC™/SDXC™ UHS-II cards

Learn more >

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Family Friendly

ASUS VivoPC VM62 - Incredibly Powerful, Unbelievably Small

Learn more >

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Lexar Professional 2000x SDHC™/SDXC™ UHS-II cards

Learn more >

Stocking Stuffer

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Lexar Professional 2000x SDHC™/SDXC™ UHS-II cards

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Best Deals on PC World

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.


Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?