Secure Your SoC From Side Channel Attacks With Adaptable Security


Many SoC and ASIC manufacturers rely heavily on cryptographic solutions to safeguard sensitive IP and data transmission within their devices. In a dynamic landscape where threats from attackers continue to evolve, encryption algorithms play a crucial role in fortifying defenses. Hackers today are leveraging advanced physical tactics that extend beyond traditional data interception, posing signi... » read more

Liquid Cooling And GaN: A Winning Combination


Data centers are facing an unprecedented transformation due to the surge in generative AI and other emerging technologies. A single ChatGPT session consumes 50 to 100 times more energy than a comparable Google search, escalating data center rack power requirements towards 200 kW or more, presenting serious challenges for operators. Cooling, in fact, takes up about 40% of the power requireme... » read more

Strategies For Defense Against Fuxnet ICS Malware


According to recent cybersecurity media reports, a new destructive ICS malware named Fuxnet has been discovered. This incident is allegedly linked to the Blackjack hacker group, which is associated with Ukrainian security agencies. It involved a major attack on Moscollector, a Moscow-based company responsible for managing critical infrastructure such as water supply, sewage treatment, and com... » read more

Can Your Doorbell Be Spoofed?


Voice anti-spoofing is a set of techniques designed to prevent scam attempts that involve mimicked voices and improve the overall UI/UX experience of VUI systems by preventing accidental triggers. These techniques are particularly important to prevent issues related to: Speech Synthesis (SS): This type of attack employs a computer-simulated voice Voice Conversion (VC): In this attack,... » read more

Accelerating Speed And Accuracy In Aeroacoustic Predictions


Simulating aeroacoustics is a tedious task that blends the complexities of fluid dynamics with the nuances of acoustic phenomena. This dual-domain challenge is marked by numerous technical obstacles, ranging from the wide range of scales involved to the subtler distinctions of acoustic signals amidst turbulent flows. To navigate these technical difficulties and advance our understanding of aero... » read more

Reset Domain Crossing Verification


By Reetika and Sulabh Kumar Khare To meet low-power and high-performance requirements, system on chip (SoC) designs are equipped with several asynchronous and soft reset signals. These reset signals help to safeguard software and hardware functional safety as they can be asserted to speedily recover the system onboard to an initial state and clear any pending errors or events. By definiti... » read more

Securing AI In The Data Center


AI has permeated virtually every aspect of our digital lives, from personalized recommendations on streaming platforms to advanced medical diagnostics. Behind the scenes of this AI revolution lies the data center, which houses the hardware, software, and networking infrastructure necessary for training and deploying AI models. Securing AI in the data center relies on data confidentiality, integ... » read more

Overcoming Chiplet Integration Challenges With Adaptability


Chiplets are exploding in popularity due to key benefits such as lower cost, lower power, higher performance and greater flexibility to meet specific market requirements. More importantly, chiplets can reduce time-to-market, thus decreasing time-to-revenue! Heterogeneous and modular SoC design can accelerate innovation and adaptation for many companies. What’s not to like about chiplets? Well... » read more

Enhancing HMI Security: How To Protect ICS Environments From Cyber Threats


HMIs (Human Machine Interfaces) can be broadly defined as just about anything that allows humans to interface with their machines, and so are found throughout the technical world. In OT environments, operators use various HMIs to interact with industrial control systems in order to direct and monitor the operational systems. And wherever humans and machines intersect, security problems can ensu... » read more

Earning Digital Trust


The internet of things (IoT) has been growing at a fast pace. In 2023, there were already double the number of internet-connected devices – 16 billion – than people on the planet. However, many of these devices are not properly secured. The high volume of insecure devices being deployed is presenting hackers with more opportunities than ever before. Governments around the world are realizin... » read more

← Older posts Newer posts →