True Zero Trust Combats IC Manufacturing Security Challenges


The semiconductor manufacturing industry is facing a host of unprecedented technology and security challenges. A common catchphrase these days is that “data is the new oil.” Data is everywhere, in everything we do, and there is both good and bad associated with this trend. Data everywhere creates new security issues that need to be addressed to protect the integrity of your information and ... » read more

Strategic Collaborations Enabling The Future of Automotive


I just returned from CES last month, the world’s most influential tech and innovation event. With over 135K attendees from across the world, 4300 exhibitors, 250+ conference sessions, and 1000 speakers, CES 2024 was the place to explore emerging trends and disruptive innovations. As CES is the showcase for innovative technologies, it is no surprise that Artificial Intelligence (AI) had a s... » read more

Preparing For An AI-Driven Future In Chips


Experts at the Table: Semiconductor Engineering sat down to discuss the impact of AI on semiconductor architectures, tools, and security, with Michael Kurniawan, business strategy manager at Accenture; Kaushal Vora, senior director and head of business acceleration and ecosystem at Renesas Electronics; Paul Karazuba, vice president of marketing at Expedera; and Chowdary Yanamadala, technology s... » read more

How To Stop Row Hammer Attacks


Row hammer is a well-publicized target for cyberattacks on DRAM, and there have been attempts to stop these attacks in DDR4 and DDR5, but with mixed results. The problem is that as density increases, distance decreases, making it more likely that flipped bit cell in one row can disturb a bit cell in another, and that bits flipped across an entire row can flip another row. Steven Woo, fellow and... » read more

Building A Comprehensive Multicloud Security Strategy: A Zero-Trust Approach


The traditional, perimeter-based security model is no longer sufficient in today’s dynamic, multicloud deployments. A zero-trust (ZT) security model, in which no user or system is inherently trusted, is becoming essential—it is a foundational capability that underpins security for multicloud strategies. The ZT security model operates on the principle of “Never trust. Always verify.” ... » read more

Post-Quantum Cryptography (PQC): New Algorithms For A New Era


Post-Quantum Cryptography (PQC), also known as Quantum Safe Cryptography (QSC), refers to cryptographic algorithms designed to withstand attacks by quantum computers. Quantum computers will eventually become powerful enough to break public key-based cryptography, also known as asymmetric cryptography. Public key-based cryptography is used to protect everything from your online communications... » read more

Plugging Gaps In The IC Supply Chain


Multiple touch points in manufacturing and packaging are exposing gaps in the data used to track different components, making it difficult to identify the source of issues that can affect yield and reliability, and opening the door to counterfeit or sub-standard parts. This involves more than just assigning a simple identifying code to a chip. At different points in a device's lifecycle, new... » read more

How Secure Are FPGAs?


The unique hybrid software/hardware nature of FPGAs makes them tempting targets for cyberattacks, while also enabling them to rebuff attacks and change the attack surface before significant damage can be done. But it's becoming increasingly challenging to address all the potential vulnerabilities. FPGAs are often included in larger systems, each with their own unique attack vectors as well a... » read more

Side-Channel Attack Protection For Quantum Safe Cryptography


A recent Reuters Special Report discussed the race between the US and China to protect digital assets and communications from the potential threat posed by quantum computers. Cryptographically relevant quantum computers, those that are powerful enough to crack existing public key-based encryption methods, could compromise military, economic, and personal information across the globe. While the ... » read more

Enabling Long-Lasting Security For Semiconductors


There’s no doubt we live in a world where technology is highly intertwined within our daily lives. It has become pervasive in our homes, our automobiles and, critically, at our work. With so many access points into our lives, we’ve not only become extremely vulnerable to data collection, but more devastatingly, hackers. Today, hackers have more time, resources, available training and motiva... » read more

← Older posts Newer posts →