Author's Latest Posts


Choosing The Right Hardware Root Of Trust


A Root of Trust is broadly defined as the security foundation for a semiconductor or electronic system. Any secure function performed by the device or system relies in whole or in part on that Root of Trust. The Root of Trust typically handles chip and device identities, cryptographic functions, stores and manages cryptographic keys, and handles one or more secure processes that provides the fo... » read more

Combating Counterfeit Chips


The harsh reality is that today, the authenticity of chips is often impossible to guarantee. The counterfeit chip market is sizeable and growing with a worldwide value estimated at $75B in 2019. Those counterfeits are believed to have been integrated into more than $169B of electronic devices. Recent confirmed incidents of counterfeit parts found in electronic systems include defibrillators, ai... » read more

Implementing Strong Security For AI/ML Accelerators


A number of critical security vulnerabilities affecting high-performance CPUs identified in recent years have rocked the semiconductor industry. These high-profile vulnerabilities inadvertently allowed malicious programs to access sensitive data such as passwords, secret keys and other secure assets. The real-world risks of silicon complexity The above-mentioned vulnerabilities are primaril... » read more

Unprotected IoT Devices Threaten Consumer Privacy And Safety


Unprotected IoT devices continue to pose a disturbing threat to both consumer privacy and security. For example, a camera installed in the Memphis bedroom of a young girl was recently hijacked by a hacker who seized control of the device to spy on the 8-year-old, taunt her with music and encourage destructive behavior. Another infamous instance of a camera falling victim to a hacker was reporte... » read more

California’s IoT Law Is A Good Start, But More Needs To Be Done


Passed by former California governor Jerry Brown, cybersecurity law SB-327 went into effect on Jan. 1. This proactive legislation requires manufacturers to equip IoT devices with “reasonable” security features to prevent unauthorized access, modification and data leaks. Specifically, SB-327 requires manufacturers to implement a unique preprogrammed (default) password for each device. Additi... » read more

What Does Cybersecurity Have To Do With Semiconductors?


More than ever, electronic devices are critical to everyday life and semiconductor chips are the brains inside the devices that run the world. They wake us in the morning, keep us up to date with the news, emails and conversations, handle our daily chores, and even keep us alive in the hospitals. For example, laptops, smartphones, the Internet, the banks, automobile controls and an endless list... » read more

Effectively Fighting Fake Medical Products


Counterfeit goods have long existed. The worldwide ‘black market’ for brand-name items like purses and sunglasses is estimated to exceed $460B (Los Angeles Times, 2017). While fashion brands make up the majority of this illicit market, a very concerning trend is the rising amount of counterfeit medical products, including equipment, medicines, and vaccines. The World Health Organization ... » read more

Right-Sized Security


Security is a key design consideration of any connected product. Nefarious parties can and will attempt to exploit security flaws in order to capture sensitive data, gain device control, or for a myriad of other reasons. When considering security needs and implementation in their systems, Device OEMs must balance a number of factors. Security is obviously a very important factor; however, de... » read more