Side-Channel Attacks Make Devices Vulnerable

As the world begins to take security more seriously, it becomes evident that a device is only as secure as its weakest component. No device can be made secure by protecting against a single kind of attack. Hypervisors add a layer of separation between tasks making sure that one task cannot steal secrets from another. Protection of the JTAG port is necessary to prevent access underneath the h... » read more

Simplifying Software Separation With Real-Time Virtualization

Electronic systems are becoming more complex across multiple markets including automotive, industrial control and healthcare. Vehicles are beginning to drive themselves, industrial robots are becoming increasingly collaborative, and medical systems are automated to assist with surgery or deliver medication. This trend is not a new phenomenon. What was a high-end capability in the last generatio... » read more

Hypervisors: Help Or Hindrance?

Hypervisors are seeing an increased level of adoption, but do they help or hinder the development and verification process? The answer may depend on your perspective. In the hardware world, system-level integration is rapidly becoming a roadblock in the development process. While each of the pieces may be known to work separately, as soon as they are put together, the interactions between th... » read more

Will Hypervisors Protect Us?

Another day, another car hacked and another report of a data breach. The lack of security built into electronic systems has made them a playground for the criminal world, and the industry must start becoming more responsive by adding increasingly sophisticated layers of protection. In this, the first of a two-part series, Semiconductor Engineering examines how hypervisors are entering the embed... » read more

Engineering Challenges Of ADAS

Advanced driver assistance systems (ADAS) have made tremendous strides in the past decade. The technology is part of the larger thrust to improve safety of cars, which cause over a million deaths per year around the world. Fortunately, fatal crashes have been on a steady decline for decades even as automobile usage has gone up. This is due in large part to safety-related technologies, including... » read more

Securing The Cloud

Cloud computing offers on-demand network access that is ubiquitous and convenient, with a pool of configurable computing resources such as shared networks, servers, storage, applications, and services. What makes this so attractive is these services can be provisioned and adapted to the load, with minimal management or service provider intervention. Cloud computing takes advantage of a distr... » read more

More Uses For Hypervisors

Hypervisors are showing up in more places than ever before as a quick and inexpensive way to utilize multiple cores and multiple chips more effectively and more securely. This marks an interesting twist for a technology that originally was developed as a way of enabling virtualization on a PC, allowing users to run multiple incompatible applications on the same computer. That was followed in... » read more

The Great IoE Race Begins

Nobody knows how many tens of billions of semiconductors will be used in the IoE, but it's a sure bet it won't be a few chips replicated billions of times. Most IoE devices will need to be customized for specific applications. Many will need to be highly reliable for many years. And all of them will need to be secure and power-efficient. Yet they also will need to connect to heterogeneous ne... » read more

Challenges For IC Security

Keeping chips secure is really a foot race between the good guys and the bad guys. Going forward, expect heavily funded, grouped efforts to place tremendous pressure on security envelopes. This includes everything from simple home devices, such as routers, to the most critical infrastructures, such as power, telecom, transportation, and soon, the IoT. Fig. 1: Courtesy of Blade Genexis I... » read more

Week In Review: System-Level Design

Mentor Graphics unveiled an embedded hypervisor for automotive infotainment systems. This is a Type 1 hypervisor, meaning it runs next to the metal and below the OS. In contrast, Type 2 hypervisors run above the OS. Mentor’s hypervisor supports multicore processors and ARM’s TrustZone security. Synopsys rolled out Ethernet controller IP for the data center, focused on energy efficiency a... » read more