Automotive Startup Activity Swelling


According to AngelList, there are at least 6,600 automotive startups, with a $4.6 million average valuation. 475 of those are electric vehicle startups with a $5 million average valuation. Indeed, the electrification of vehicles and move towards autonomous driving is having a huge impact, the likes of which the automotive industry has never seen. This is causing the car manufacturers and Tie... » read more

Bluetooth Mesh Drives Security For Automotive Applications


The use of Bluetooth technology continues to grow beyond mobile into rapidly expanding IoT and automotive applications. Consumers have grown to expect hands-free calling via Bluetooth, however, as the technology moves to other use cases such as tire pressure monitors or door lock connectivity, security becomes a key challenge to automotive SoC designers. Bluetooth-enabled devices have been a... » read more

IoT Security Manifesto


Securing tomorrow means rethinking how we design intelligent devices by embracing concepts from outside the digital realm and taking advantage of advanced new technologies. Some of the things the Arm Security Manifesto explores: A digital immune system. Technologists develop human-like immune systems and health-care services that automatically detect, quarantine and treat any cyber inf... » read more

Reshaping Automotive Design


The entire automotive ecosystem is being reshaped by vehicle electrification, assisted and autonomous driving, and the connectivity needed to make it all work. So far, it's not clear just how smoothly this will all come together. In this redefined world, electronics and software will provide differentiation rather than mechanical engineering and possibly even brand name, creating change on a... » read more

Self-Driving Cars At CES: The Future Of Transportation Is Here


CES 2018 attendees will get a new kind of tech demo in just a few weeks. When they hail Lyft to take them from the Las Vegas Convention Center across town, it will be a fully automated point-to-point vehicle getting them there. While we marvel now, today’s novelty will be tomorrow’s norm, though questions about the safety of autonomous driving persist. For the CES demo, a backup pilot wi... » read more

Protecting Electronic Systems From Side-Channel Attacks


During the early days of safecracking, rudimentary rotary locks were compromised by feel or sound to determine the correct combination. Following in this tradition, malicious actors are now exploiting side-channel attacks (SCA) to compromise cryptographic systems. To be sure, all physical electronic systems routinely leak information about the internal process of computing via fluctuating level... » read more

The Importance Of Metal Stack Compatibility For Semi IP


Architects and front end designers usually leave the back end to the physical designers: they know there can be different numbers of metal layers, but may not realize the characteristics of each metal layer may vary layer by layer as well and that different chips use different metal stack ups to optimize for their requirements. This slide from IDF14 shows a simple summary of the breadth of v... » read more

Sensors Drive IoT Intelligent Systems


Back in 1980, it is believed that the first intelligent electronic sensor was proposed (by S. Middelhoek and J.B. Angell). Their idea was to combine a MEMS sensor, an analog-to-digital convertor, and a processor to analyze the analog data generated by the sensor. But, as many great electronics ideas, the technology to put this all together on a CMOS IC was not nearly ready at that time. Toda... » read more

Measuring ISO 26262 Metrics Of Analog Circuitry In ICs


The goals for automotive electronics are zero defective parts per million (0 DPPM), and safe operation during the expected lifetime of the vehicle. The ISO 26262 standard provides procedures and metrics required before delivery to ensure systems can be expected to operate without unreasonable risk. ISO 26262 specifies circuit metrics and minimum values that are design requirements. Since the... » read more

Thwarting Side-Channel Attacks With DPA-Protected Software Libraries


All physical electronic systems routinely leak information about the internal process of computing via fluctuating levels of power consumption and electro-magnetic emissions. Much like the early days of safecracking, electronic side-channel attacks (SCA) eschew a brute force approach to extracting keys and other secret information from a device or system. Moreover, SCA conducted against elec... » read more

← Older posts Newer posts →