How Safe Is Safe Enough?


That was the overarching question a group of 180 experts discussed last week at the ISO 26262 & SOTIF conference for four days during #FuSaWeek2023 in Berlin. "How Safe is Safe Enough" is also the title of Prof. Koopman's book from September 2022. I mentioned him in my blog "Are We Too Hard On Artificial Intelligence For Autonomous Driving?" Prof. Koopman was referenced often in Berlin, and... » read more

Going Virtual In Automotive Electronics Development


Developing the electrical/electronic (E/E) systems in automobiles and other vehicles has always been challenging due to the rough environmental conditions experienced on the road and the high expectations for safety and reliability. In recent years, these challenges have been exacerbated by several industry trends. They have triggered a revolution in how electronic control units (ECUs) are desi... » read more

Hardware-Based Cybersecurity For Software-Defined Vehicles


As vehicle technology advances, so does the complexity of the electrical/electronic systems within these smart vehicles. A software-defined vehicle (SDV) relies on centralized compute and an advanced software stack to control most of its functionality, from engine performance to infotainment systems. SDVs are becoming more important as automakers look to improve vehicle performance, reduce emis... » read more

Issues And Challenges In Super-Resolution Object Detection And Recognition


If you want high performance AI inference, such as Super-Resolution Object Detection and Recognition, in your SoC the challenge is to find a solution that can meet your needs and constraints. You need inference IP that can run the model you want at high accuracy. You need inference IP that can run the model at the frame rate you want: higher frame rate = lower latency, more time for dec... » read more

Securely Store Your Credentials And Cryptographic Keys In TPM 2.0


A Trusted Platform Module (TPM) can securely store cryptographic keys that are specific to the host system and provide restricted access to the stored keys and secrets. You can never read out private keys, or in other words retrieve them as is from the TPM. Let’s say you need to generate a signature: you can indicate the private key you wish to use from the TPM to sign the message. You can... » read more

Automotive Security: Meeting The Growing Challenges With Certified Hardware Security Module IP


Automotive systems, and the semiconductors used within them, are some of the most complex electronics seen today. The radical transformation from an isolated mechanical car to a connected software-driven car is driving the increased use of semiconductors in vehicles: these include advanced driver assistance systems (ADAS), electrification, and enhanced driver/passenger experience. More conne... » read more

Secure Implementation Of Post-Quantum Crypto In The Spotlight


The US-based NIST body takes a leading role in the migration to Post-Quantum Crypto (PQC). After a multi-year selection process, in 2022 they preliminarily identified a number of Post Quantum algorithms, which were recommended to replace the current public key algorithms (RSA, ECC). While the process of scrutiny is still ongoing, they now took another important step by putting emphasis on imple... » read more

The Automotive Electric Vehicle Transition


The only really interesting part of the automotive industry is the electric vehicle (EV) segment. These vehicles are also called NEVs in China for "new energy vehicles". The reason that I say this is the only interesting segment is because it is clear that the whole world is moving fast to EVs and internal combustion engines (ICEs) will decline. One challenge for traditional automotive manufact... » read more

The Hidden Security Risks Of Automotive Electronic Systems


The Internet of things (IoT) is driving new capabilities that are transforming how we live, work and play. However, as our lives become more connected, the risk from hackers and other security breaches increases with every new IoT device. While most of us are pretty well versed in why we need to keep our most trusted devices secure – such as cell phones and laptops – we often don’t think ... » read more

How To Safeguard Memory Interfaces By Design


By Dana Neustadter and Brett Murdock In 2017, the credit bureau Equifax announced that hackers had breached its system, unleashing the personal information of 147-million people. As a result, the company has settled a class action suit for $425 million to aid those impacted, including identity theft, fraud, financial losses, and the expenses to clean up the damage. Whether the threat is iden... » read more

← Older posts Newer posts →