Safeguarding Automotive Electronics


Modern automobiles can have up to 100 Electronic Control Units (ECUs) depending on their class, make, and model, with the number of ECUs rising even higher in the case of electric vehicles. An ECU is an embedded system in the car’s electronics. They are used to control all the vehicle's functions, including engine, powertrain, transmission, brakes, suspension, dashboard, entertainment system ... » read more

Capabilities In CAP, CHERI, And Morello


At the recent Arm DevSummit, one of the presentations mentioned CHERI and the Arm Morello board in passing. This was in the context of using capabilities (perhaps) in some future Arm processors to increase the amount of memory safety, and to protect against vulnerabilities like Spectre and Meltdown. I'd never heard of either, so I was intrigued and decided to look into the details. But the f... » read more

Effective Configuration Of Security Tools


To do a job well, you need the right tools. But it’s just as important—perhaps even more so—to use those tools correctly. A hammer will make things worse in your construction project if you’re trying to use it as a screwdriver or a drill. The same is true in software development. The intricacies of coding and the fact that it’s done by humans means that throughout the software deve... » read more

IC Integrity Of Edge-Computing Processors: Meeting The Demands Of AI


If you ask most people, they would say that we’re living in an age of artificial intelligence (AI). But the reality is that we’re just getting started. The age of artificial intelligence is still in its infancy. So many of aspects of our lives involve technology but we’re still having to feed that technology or manually operate that technology in order get the results we want. Autonomous ... » read more

Establishing A Special Interest Group On Common Hardware Weaknesses


It seems like almost every week yet another hardware security vulnerability is announced. Just last week a team of researchers disclosed a new attack called “Platypus”, an acronym for "Power Leakage Attacks: Targeting Your Protected User Secrets.” This is another attack exploiting the simple fact that hardware sits below the conventional security abstractions and finding a vulnerability i... » read more

Who’s Got The Hot Potato?


In COVID-19 times, gathering a few friends in a circle and playing “hot potato” may sound like a dream. For car manufacturers and the automotive electronics supply chain, handling the cybersecurity hot potato is not quite a nightmare but certainly not a fun game. Companies like Volkswagen, Fiat, and Ford have much expertise in managing a complex supply chain and post-sale support. Most car ... » read more

Achieving Security Goals With A Hardware Root Of Trust


In an environment of growing threats, meeting a fundamental set of security goals is imperative for safeguarding devices and data from attack. The most robust means of meeting these goals is a root of trust anchored in hardware. In Microsoft’s “The Seven Properties of Highly Secured Devices” white paper, property #1 is implementation of a hardware root of trust. As Microsoft explains: ... » read more

ResNet-50 Does Not Predict Inference Throughput For MegaPixel Neural Network Models


Customers are considering applications for AI inference and want to evaluate multiple inference accelerators. As we discussed last month, TOPS do NOT correlate with inference throughput and you should use real neural network models to benchmark accelerators. So is ResNet-50 a good benchmark for evaluating relative performance of inference accelerators? If your application is going to p... » read more

Model Variation And Its Impact On Cell Characterization


EDA (Electronic Design Automation) cell characterization tools have been used extensively to generate models for timing, power and noise at a rapidly growing number of process corners. Today, model variation has become a critical component of cell characterization. Variation can impact circuit timing due to process, voltage, and temperature changes and can lead to timing violations, resulting i... » read more

How End-To-End Solutions Support Tomorrow’s Automotive Electrical Systems


We are living in a time of significant change and disruption in the automotive industry. The amount of electrical and electronic content in today’s vehicles continues to explode as consumers demand greater personalization of products and regular feature updates, and as tomorrow’s technologies such as autonomous and electric drive continue to develop. Meanwhile, established carmakers are gra... » read more

← Older posts Newer posts →