Supporting CPU Plus FPGA


While it has been possible to pair a CPU and FPGA for quite some time, two things have changed recently. First, the industry has reduced the latency of the connection between them and second, we now appear to have the killer app for this combination. Semiconductor Engineering sat down to discuss these changes and the state of the tool chain to support this combination, with Kent Orthner, system... » read more

The Hidden Costs Of Security


There is no argument these days among chipmakers that security needs to be implemented at every level. So why isn't it happening? The answer is more complex than companies pinching pennies, although that is certainly a factor for some chips. The reality, though, is security carries a price for every facet of semiconductor design—power, performance and area. And the impact reaches much furt... » read more

Electric Vehicles Set The Pace


Electric vehicles are leading the charge for innovation in automotive electronics. Companies that invested and embraced the challenge of EVs are besting their less-nimble, less-open-minded engineering cohorts. Semiconductors and embedded computers have been controlling the dashboard, mirrors, seats, heating and cooling for years. But with EVs, engineering teams are starting to tackle tas... » read more

Building Secure Software At Enterprise Scale


The cost of finding and remediating a software defect reduces dramatically the earlier it is found in the development life cycle. This is not new news. What is new news is an approach that builds security into the development process in a way that is easy for developers to adopt, without slowing down their workflow. Download the paper to learn how you can: Prevent common bugs and flaw... » read more

Security: Losses Outpace Gains


Paul Kocher, chief scientist in [getentity id="22671" e_name="Rambus'"] Cryptography Research Division, sat down with Semiconductor Engineering to discuss the new threats to security, artificial intelligence and machine learning, and how to engineer a secure system. What follows are excerpts of that conversation. SE: Where are we with security? It seems that rather than getting better, thing... » read more

The Evolution Of Side-Channel Attacks


A side-channel attack can perhaps best be defined as any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms. Put simply, all physical electronic systems routinely leak information about their internal process of computing via their power consumption or electromagnetic emanations. This mean... » read more

IoT Security Risks Grow


Semiconductor Engineering sat down to discuss security issues with Asaf Shen, vice president of marketing for security IP in [getentity id="22186" e_name="ARM's"] Systems & Software Group; Timothy Dry, principal staff marketing manager for the Industrial IoT segment at [getentity id="22819" comment="GlobalFoundries"]; Chowdary Yanamadala, senior vice president of business development at Cha... » read more

Biz Talk: ASICs


eSilicon CEO [getperson id="11145" comment="Jack Harding"] talks about the future of scaling, advanced packaging, the next big things—automotive, deep learning and virtual reality—and the need for security. [youtube vid=leO8gABABqk]   Related Stories Executive Insight: Jack Harding (Aug 2016) eSilicon’s CEO looks at industry consolidation, competition, China’s impact, an... » read more

Data Leakage And The IIoT


The Internet of Things has raised concerns about people hacking into home networks or using armies of bots to disrupt communications. But with the Industrial IoT, the stakes are significantly higher—and the effects can last much longer. Security tops the list of concerns as more industrial equipment is connected to the Internet, according to numerous industry insiders. That hasn't stopped ... » read more

System Bits: March 21


Sensors vulnerable to sonic cyber attacks According to University of Michigan researchers, sound waves could be used to hack into critical sensors in a wide range of technologies including smartphones, automobiles, medical devices and IoT devices. New research calls into question the longstanding computer science tenet that software can automatically trust hardware sensors, which feed auton... » read more

← Older posts