Unexpected Security Holes


Security is emerging as one of the top challenges in semiconductor design across a variety of markets, with the number of security holes growing by orders of magnitude in sectors that have never dealt with these kinds of design constraints before. While security has been a topic of conversation for years in mobile phones and data centers, commercial and industrial equipment is being connecte... » read more

Counterfeiting In The Automotive Supply Chain


While counterfeiting is not a new problem in the automotive space by any means, the stakes are higher all the time when you consider the increase in more sophisticated electronics and electronic systems being designed into vehicles today. While we don’t want to think about the worst case scenario of a counterfeit airbag in the family minivan or a counterfeit battery in a hybrid vehicle, we mu... » read more

The Race To Secure The Car


A shift is underway in the automotive industry to connect cars to each other and to a variety of communications infrastructure, adding many of the features that consumers now expect in mobile devices as well as some new ones that ultimately will lead to autonomous vehicles. But along with those changes are some nagging questions about just how safe that technology will be for consumers and othe... » read more

Battle Looms Over Mobile Payments


The lines are drawn. The sides are sizing each other up. Apple is on one side with secure element, and Google and Microsoft are on the other side with host card emulation. Both are mobile payment systems for smartphones that rely on near-field communication technology. Apple fired the first shot with SE, and Google soon replied with HCE. And now both sides are ramping up after months of dela... » read more

What Is Cyberwarfare?


Cyberwarfare is emerging as the most sophisticated battleground of the 21st century. In fact, the military in all major countries make it a priority. Collectively they are spending tens of billions of dollars on education and building a knowledgebase of how attacks can be perpetrated and what defenses are needed. The entire effort is based on technology, both legacy and new, starting on the ... » read more

M2M Vs. IoE


For some time now, there has been discussion that the IoE is really nothing more than the M2M infrastructure with a new coat of paint. Are M2M and the [getkc id="260" comment="Internet of Everything"] really just different generations of the same family, or are they completely different? This is more than just a philosophical question. The answer affects everything from technology investmen... » read more

Executive Insight: Paul Kocher


Paul Kocher, president and chief scientist of Rambus' Cryptography Research Division, sat down with Semiconductor Engineering to talk about the state of security today and how it will be affected as more devices are connected. What follows are excerpts of that conversation. SE: The number of vulnerabilities is increasing. Are we making progress? Kocher: If your metric for progress is the... » read more

Sensors Enable ADAS


Under the hood, cars of today look nothing like those of a few decades ago. There are sophisticated safety and drivetrain monitoring features, software for interpreting and interacting with the outside world and modifying the inside environment, and a host of features that might have seemed impossible or even ridiculous in the past. And there's much more to come. Advanced driver assistance s... » read more

Smarter Cities


One of the benefits touted by IoE proponents is that smart cities will improve the quality of life and make cities more “livable.” The concept is appealing, and if it comes to pass as visionaries hope, the smart city of the future will be a virtual cornucopia of convenience and efficiency. Residents and vistors will never be lost with the proliferation of location technologies, which als... » read more

New IP Risks


The world is being flooded with Internet-enabled devices, from smart toothbrushes to smart appliances to smart aircraft, and everything in between. Some of this is expected to be connected to the Internet, and some has been for quite some time. But devices such as smart toothbrushes and smart socks pose a whole new challenge. The issue is that even low-end chips need some sort of IP, but if ... » read more

← Older posts