DPA Countermeasures Done Right


In the late nineties, Paul Kocher, Josh Jaffe, and Ben Jun published a paper that caused many across industry sectors to reconsider what cryptographic implementations should look like. They described an exploit wherein an adversary could extract secrets from a device by analyzing the power consumption or electromagnetic emittance from the device when it was executing cryptographic operations. S... » read more

Hardware Security Optimization With MITRE CWE


Whether you’re just starting to build out a hardware security program at your organization, or you’re looking to optimize existing hardware security processes, the MITRE Common Weakness Enumeration (CWE) database is an excellent resource to keep in your toolbox. What is CWE? A CWE is a type of vulnerability, or flaw, in the design of either hardware or software in embedded systems. Indi... » read more

Machine Learning Showing Up As Silicon IP


New machine-learning (ML) architectures continue to appear. Up to now, each new offering has been implemented in a chip for sale, to be placed alongside host processors, memory, and other chips on an accelerator board. But over time, more of this technology could be sold as IP that can be integrated into a system-on-chip (SoC). That trend is evident at recent conferences, where an increasing... » read more

Internet Tech Trends For 2022


Every year at the start of the year, Benedict Evans produces a big presentation on trends in technology, internet, mobile, and so on. He used to live in the US and did this for Andreesen-Horowitz (a16z), but he has since returned to Britain (he's English) and I think has his own consulting company. This year's presentation is titled "Three Steps to the Future." The most exciting themes in t... » read more

Higher Creepage And Clearance Make For More Reliable Systems


Electrical and electronic applications must be designed to ensure human safety, as well as systems reliability from high-voltage conditions. Thus, the power semiconductors used must also fulfill these safety and distance standards set by organizations such as Underwriter Laboratories (UL) or the International Electrotechnical Commission (IEC). Even though the TO247 package has been widely us... » read more

Why Banks Should Be More Worried About Security


At about 10:30 a.m. on Friday, Feb. 5, 2016, Jubail Bin-Huda, a joint director of Bangladesh Bank, and a colleague went to pick up the latest Society for Worldwide Interbank Financial Telecommunication (SWIFT) acknowledgement messages from the printer. When they got to the printer, they found nothing had been printed. They restarted the printer manually, but it still didn't work. They had no... » read more

Building Multipurpose Systems With Dynamic Function Exchange Part Three: Tools For Deploying DFX


In our previous two articles, we introduced you to the concept of Dynamic Function Exchange (DFX), a design approach that dynamically reallocates unused system resources to other tasks. We also introduced you to some techniques for bundling and managing your DFX resources. In this article, we will discuss some of the adaptive computing tools that make DFX possible. As part of its investment ... » read more

Manufacturing Cyber Security


Designers and manufacturers worldwide are concerned about manufacturing cyber security and design data when using additive manufacturing technology. This whitepaper from Identify3D discusses how digital product data is shared during the additive manufacturing workflow and how that data might be better secured. Using products from Identify3D and Siemens, the entire additive manufacturing data ch... » read more

Meet Both Security And Safety Needs In New Automotive SoCs


With advances in hardware and software, smart vehicles are improving with every generation. Capabilities that once seemed far-off and futuristic—from automatic braking to self-driving features—are now either standard or within reach. However, as vehicle architectures evolve, the ways that both security and safety can be addressed at the system-on-chip (SoC) level also must evolve. Cars a... » read more

Why Traceability Matters


More heterogeneous and increasingly dense chip designs make it much harder to stay on track with initial specifications. Paul Graykowski, senior technical marketing manager at Arteris IP, talks about matching requirements to the design, the impact of ECOs and other last-minute changes, and best practices for managing revisions. » read more

← Older posts Newer posts →