An End-to-End Bitstream Tamper Attack Against Flip-Chip FPGAs


Abstract "FPGA bitstream encryption and authentication can be defeated by various techniques and it is critical to understand how these vulnerabilities enable extraction and tampering of commercial FPGA bitstreams. We exploit the physical vulnerability of bitstream encryption keys to readout using failure analysis equipment and conduct an end-to-end bitstream tamper attack. Our work undersco... » read more

Design of strongly nonlinear graphene nanoelectromechanical systems in quantum regime


ABSTRACT "We report on the analysis and design of atomically thin graphene resonant nanoelectromechanical systems (NEMS) that can be engineered to exhibit anharmonicity in the quantum regime. Analysis of graphene two-dimensional (2D) NEMS resonators suggests that with device lateral size scaled down to ∼10–30 nm, restoring force due to the third-order (Duffing) stiffness in graphene NE... » read more

Manufacturing Bits: Jan. 10


Finding new materials with inverse design The Singapore-MIT Alliance for Research and Technology (SMART) has found a new way to perform general inverse design, a technique that can accelerate the discovery of new materials. The concept of inverse design is simple. Let’s say you want to develop products with select materials. In a computer, you input the desired materials and the propertie... » read more

Power/Performance Bits: Jan. 10


Muscle-tracking clothing Researchers from the University of Utah and Gyeongsang National University developed a low-cost bioelectrical sensor that can be integrated into clothing. The sensor measures electromyography (EMG) signals that are generated in muscles when they contract. EMG signals are useful for studying muscle fatigue and recovery and could potentially be used to inform diagnosi... » read more

Week In Review: Manufacturing, Test


Fab tools A fire broke out this week within ASML’s factory in Berlin, Germany. The fire was quickly extinguished and no one was injured during this incident. The factory manufactures components for ASML’s lithography systems, including wafer tables and clamps, reticle chucks and mirror blocks. The fire took place on Jan. 3. On Jan. 7, ASML provided an update. "The manufacturing of DUV c... » read more

Week In Review: Design, Low Power


SK Hynix completed the first phase of its acquisition of Intel's NAND and SSD business. In this first step it took control Intel’s SSD business and the Dalian NAND flash manufacturing facility in China, for a price of $7 billion. Next, it will acquire from Intel the remaining assets in relation to its NAND business, including IP related to the manufacture and design of NAND flash wafers, R&am... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive As part of its in-cabin monitoring wares at Consumer Electronics Show (CES) 2022, U.S.-based Gentex demonstrated the Vaporsens gas sensors, a nanofiber chemical sensor technology that monitors cabin air quality and can ID airborne contaminants. One use would be to monitor if outside contaminants get into the cabin, the sensor could trigger the car to turn on the recirculation of air... » read more

Automotive Outlook: 2022


The auto industry is widening its focus this year, migrating to new architectures that embrace better security, faster data movement, and eventually more manageable costs. The auto industry is facing both short-term and long-term challenges. In the short term, the chip shortage continues to top the list of concerns for the world's automakers. That shortage has delayed new vehicle deliveries,... » read more

Security Starts With A Threat Assessment


Developing the security architecture for an electronic device begins with building a threat model wherein we ask these questions: What is the operational environment in which the device needs to function? What type of attacks can be identified? What level of access does a potential attacker have to the device? What possible attack paths can an attacker exploit? What resources (... » read more

Building Multipurpose Systems With Dynamic Function Exchange


One of the most-common oversights that designers can make is to not fully use available system resources. Typically, design and optimization efforts are focused on performance and efficiency. Mission-critical and real-time tasks are allocated hardware-based resources to accelerate their execution. But when large portions of the architecture are underutilized – in other words, they remain idle... » read more

← Older posts Newer posts →