Protecting The Connected Automobile From Modern-Day Cyberattacks


As the industry continues to make advances in the autonomous vehicle as well as in vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications, automotive OEMs must do everything possible to protect the connected automobile from potential cyberattacks. Unfortunately, attacks have become so prevalent, regulatory agencies are now defining cybersecurity requirements. New laws are b... » read more

Secure TSN Ethernet With MACsec Is Now Possible


For end-to-end security of data, it must be secured both when at rest (processed or stored in a device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides that foundation upon which all data security is built. Applications, OS, and boot code all depend on the root of trust as the source of confidentiality, integri... » read more

Preventing Online Fraud


I attended a webcast on Anti-Fraud organized by the RSA Conference in the leadup to the conference itself. The anti-fraud webcast was split into two sections. First was Steve Winderfield, who is advisory CISO at Akamai, titled "How We Can Keep up with Cyber-Criminals' Evolving Business Models?" The second part was by Michael Tiffany of White Ops and Chris Ott of Rothwell Figg, titled "Dete... » read more

Greetings From Mars


Hello Mars. Congratulations to the amazing engineers and scientists at NASA and Jet Propulsion Labs (JPL) for a successful touchdown on the Mars Jezero Crater. In July 2020, NASA launched the Perseverance rover mission, which sought to find signs of habitable conditions, search for biosignatures, and collect samples for future Mars-sample-return missions and human expeditions. Seven months l... » read more

COVID-19 And Cybersecurity: Pay Attention To Exponential Growth!


COVID-19 and cybersecurity – you may wonder what these two seemingly very different topics have in common. I would list two: Both of them are exponential in nature, which, as a society we have difficulties grappling with – making this one of the reasons for our uneven responses. Both of them require a multi-layered solution strategy that, while it does not need to be perfect, must b... » read more

The Best AI Edge Inference Benchmark


When evaluating the performance of an AI accelerator, there’s a range of methodologies available to you. In this article, we’ll discuss some of the different ways to structure your benchmark research before moving forward with an evaluation that directly runs your own model. Just like when buying a car, research will only get you so far before you need to get behind the wheel and give your ... » read more

Over-the-Air Automotive Updates


Modern vehicles are increasingly-connected devices with growing volumes of electronic systems. This systemic complexity means that even an average vehicle design will include over 150 ECUs, which control not just infotainment and communications, but powertrain, safety, and driving systems (figure 1). We see not just a surge in the volume and complexity of electronic hardware, but also software.... » read more

Virtualizing FPGAs For Multiple Cloud Users


Cloud computing has become the new computing paradigm. For cloud computing, virtualization is necessary to enable isolation between users, high flexibility and scalability, high security, and maximized utilization of hardware resources. Since 2017, because of the advantages of programmability, low latency, and high energy efficiency, FPGA has been widely adopted into cloud computing. Amazon ... » read more

Challenges Of Using The Cloud For IC Design


The ‘cloud’ is so ubiquitous that perhaps even your grandmother has heard about it. There are advertisements on TV with various vendors touting their cloud offerings. The cloud is ideal for eCommerce and SaaS (Software as a Service) offerings, as the elasticity on demand provides a convenient way to scale up when demand is high and scale down when it is low. Yet the design community has ... » read more

Water System Hack And The Implications For Hardware Security


Last month we talked about the SolarWinds hack and now this month another disturbing attack has taken place – this time on a water supply system in Florida. Unfortunately, these types of attacks are becoming more frequent, giving us all pause as to how secure the systems that serve our everyday life really are. What lessons can we take from this recent attack that we can implement to make thi... » read more

← Older posts Newer posts →