Data Security Drives Innovative Verification Capabilities For SoCs


The protection and integrity of data is a key challenge for organizations and businesses as human interactions with computers have expanded enormously. This has created a vast amount of information and led to the age of “Big Data” where massive, rich data sets are collected and analyzed to advance knowledge and progress in multiple fields. The security of this data has become a critical nee... » read more

The Changing Automotive Industry Landscape


By Lance Brooks and Brendan Morris Consumer demand for sophisticated highly connected vehicles that provide advanced features is forcing the global automotive industry to develop more advanced electrical and electronic (E/E) architectures. The increasing adoption of connected features in all categories and segments, including on and off-road vehicles, is also driving powerful smart features ... » read more

Standards And Threat Testing For Secure Autonomous Vehicles


Modern vehicles continue to move up through the levels of autonomy, as defined by The Society of Automotive Engineers (SAE). These definitions have been widely adopted across the industry and emerging vehicle technology is measured against this scale (figure 1). Fig. 1: An illustration from the Society for Automotive Engineers shows levels of autonomy. The closer we move towards level... » read more

Do You Know For Sure Your RISC-V RTL Doesn’t Contain Any Surprises?


Given the relative novelty and complexity of RISC-V RTL designs, whether you are buying a commercially supported core or downloading a popular open-source offering, there is the small but non-zero risk of unwanted surprises escaping undetected into your end-product. In order of high-to-low probability, consider: The presence of a weird-yet-entirely-possible corner-case bug Bugs “insid... » read more

Managing Today’s Advanced Vehicle Networks Design Challenges


Today’s automotive electrical and electronic (E/E) architectures are highly complex, with the functionality of many vehicle features distributed across multiple discrete ECUs. The ECUs, sensors and actuators are not all directly connected, and much of the data communication occurs across networks, often through gateways over several networks. Modern E/E architectures are formally organized ar... » read more

Securing Connected And Autonomous Vehicles


Vehicles are on track to become highly sophisticated Internet of Things (IoT) devices. With the added functionality that connects vehicles to other vehicles, the infrastructure, and even pedestrians, the opportunity for hacking expands. Challenges like complexity and the burden of legacy systems further complicate the situation. The future of connected and autonomous vehicles (CAV) demands leve... » read more

Optimizing System-Level Connectivity In Heterogenous Automotive Packages


By Keith Felton and Cristina Somma With the massive growth of electronics in the automotive sector (such as autonomous driving, electric vehicles, and safety systems), the complexity, capabilities, and volume of semiconductors is rapidly increasing the demand for greater package connectivity density. This has led to high-end IC-package solutions, such as copper pillar bumping with very fi... » read more

How Verification And Validation Can Create A Comprehensive Digital Twin To Design Tomorrow’s Self-Driving Cars Today


By Shakeel Jeeawoody and Hieu Tran Autonomous vehicles (AV) are the future of driving – and the future might not be so far away. Optimizing the capabilities of self-driving vehicles and the environment around them could lead to a mad dash to the financial finish line for manufacturers. Who takes the checkered flag will ultimately be determined by the efficiency and cost-effectiveness of th... » read more

High-Quality Test And Embedded Analytics Are Vital For Secure SoCs


Applications such as smart cards and devices used in the defense industry require security features to ensure that sensitive data is inaccessible to outside agents. This used to be a niche requirement met through custom solutions. However, now that automotive and cyber-physical systems are proliferating, the requirements around secure test and monitoring are becoming mainstream. The current bes... » read more

Building A More Secure SoC


SoC integrators know that a software-only chip security plan leaves devices open to attack. All that a hacker needs to do is find a way to replace key parts of the bootloader or the low-level firmware to compromise other software in the system used to support secure access. The most simple attacks come remotely over a network, and these can be patched with software upgrades. However, we see ... » read more

← Older posts Newer posts →