Blog Review: Sept. 6

IoT edge security; AI composers; voting machines; stealing encryption keys.

popularity

Mentor’s Jeff Miller explains why hardware security is important for IoT edge devices, where vulnerabilities lie today, and how researchers created an undetectable backdoor attack circuit.

Cadence’s Meera Collier argues that while AI is getting good at many things, composing music is not yet one of them.

Synopsys’ Robert Vamosi considers the state of voting machine security as security researchers search for the machines’ weaknesses at DEF CON.

Rambus’ Aharon Etengoff reports on a miniature system built by security researchers capable of covertly recovering AES-256 encryption keys using side-channel analysis.

Marvell’s Jeroen Dorgelo argues that software based encryption is not enough for embedded systems in industrial and military applications, and points to self-encrypting drives as a solution.

ARM’s Kaiyou Wang dives into a Linux solution for instruction trace without an external debugger involved with Coresight.

ON Semi’s Michael DeLuca checks out what the solar eclipse looked like from the moon.

Cadence’s Paul McLellan listens in on how Internet use is changing around the world, with a focus on China and India, from a presentation by Mary Meeker of Kleiner Perkins.

Mentor’s Nitin Bhagwath examines how designing wide, high speed busses is complicated by signal integrity issues and validation requirements.

Synopsys’ Richard Solomon explains the function and importance of the PCI Express Root Complex.