Author's Latest Posts


Side-Channel Attacks


There are many techniques available for hackers to gain access to a system and obtain secret keys or other proprietary information– from invasive methods, such as microprobing, to noninvasive methods, such as cryptoanalysis. However, one of the easiest and most effective ways to extract the contents of a chip is through a side-channel attack using power analysis. To read more, click here. » read more

Reduced Memory Power For Internet of Things Applications


Memory has historically been a very stable technology, whether volatile or non-volatile. Incremental change happens constantly to improve performance, but it’s unusual for a major change to take place. The non-volatile one-time-programmable memory approach that Kilopass uses has been in place for thirteen years with no major changes. Now, however, Kilopass is readying a new memory array for t... » read more

OTP Dynamic Power Cut By Factor Of 10


Of the challenges being addressed by Internet of Things (IoT) designers around the globe, none is more pressing than the need to reduce edge-node power. While eyes often turn to the radio as primary consumer of energy, memory, including NVM memory, also contributes a substantial portion of the energy consumed by an edge node. Power reductions in all memories will be essential for meeting this c... » read more

One-Time-Programmable Dynamic Power Cut By Factor Of 10


Of the challenges being addressed by Internet of Things (IoT) designers around the globe, none is more pressing than the need to reduce edge-node power. While eyes often turn to the radio as primary consumer of energy, memory, including NVM memory, also contributes a substantial portion of the energy consumed by an edge node. Power reductions in all memories will be essential for meeting this c... » read more

Big Data Needs Bigger Memory


By Rodrigo Liang Over the last few decades, the semiconductor industry has focused its considerable technical investments in accelerating software applications. Performance metrics for new semiconductor products are often correlated with their ability to lower the latency to access data required to run specific software applications. The need for increased performance from semiconductors ... » read more

A Low-Cost, Low Power Memory Solution For IoT Devices


The Internet of Things (IoT) connects everyday devices onto the Internet to gather information using sensors, embedded systems, and MEMS (micro-electrical mechanical systems). That information is then processed to increase efficiency or enable new services. With the proliferation of smartphones, tablets and laptops, industry estimates that there are currently more than five-billion devices ... » read more

A Comparison Of Embedded Non-Volatile Memory Technologies And Their Applications


With complexity of SOCs growing and time to market cycles shortening, designers need to have an arsenal of tricks to deliver highly differentiated products to market quickly. The arsenal may include SystemC, EDA tools to achieve a faster timing closure, and IP from high speed I/Os to memories. The most pervasive memory IPs are SRAM and ROM. Less pervasive memory IPs include non-volatile memory ... » read more

How Semiconductor IP Became Critical To SoC Design


By Mark Templeton In 1991, I had the good fortune to be a member of the founding team of Artisan Components. We started the company believing that demand was about to appear for semiconductor intellectual property. We had a few data points. We knew that before a company could start a new chip project, they first had to design and verify all kinds of generic building blocks – things like ... » read more