Boost Your CFD Workflow Productivity With An API: Part 1


If you're in the field of computational fluid dynamics testing or studies, you already know how much time and effort it takes to complete the tasks involved. Hours upon hours are spent on geometry clean-up, meshing, and post-processing. Furthermore, when you're dealing with similar models that have new constraints or dimensions, the work can feel tedious. But don't worry! There’s a way to sim... » read more

New Approaches To Sensors And Sensing


Sensors are becoming more intelligent, more complex, and much more useful. They are being integrated with other sensors in sensor fusion, so a smart doorbell may only wake up when it’s imperative to see who’s at the door, and a microphone may only send alerts when there are cries for help or sounds of glass breaking. Kim Lee, senior director of system applications engineering at Infineon, t... » read more

A Survey Of Machine Learning Applications In Functional Verification


Functional verification is computationally and data-intensive by nature, making it a natural target of machine learning applications. This paper provides a comprehensive and up-to-date analysis of FV problems addressable by ML. Among the various ML techniques and algorithms, several emerging ones have demonstrated outstanding potential in FV. Yet despite the promising research results, criti... » read more

Solving the AppSec Puzzle: Connecting AppSec To Your DevOps Pipeline


Integrating application security (AppSec) into your software development life cycle and DevOps pipeline is increasingly important in today’s development environment. Commonly referred to as “shifting left” or “shifting everywhere,” AppSec integration helps avoid the late-stage testing and development that can delay product releases or lead to overlooked risks being promoted into produ... » read more

Achieving ISO/SAE21434 Cyber Security Using Secure Flash


ISO/SAE21434 specifies the requirements for making a car system more robust against cyber-attacks. It outlines the criteria during the concept, development, production, usage and decommission of automotive systems. The requirements of ISO 21434 applies to systems, subsystems and components whose development started after the publication of the standard in August 2021. ISO21434 has been made ... » read more

RT-600 Root Of Trust Series: A New Generation of Security Anchored In Hardware


This latest generation of the Rambus RT-600 Root of Trust IP offers many new features designed to support the security needs of customers today and into the future. These features include Quantum Safe Cryptography, Caliptra Root of Trust for Measurement (RoTM) emulation, an embedded physical unclonable function (PUF), as well as many architectural improvements, such as larger memory space and 6... » read more

HW/SW Security Mechanisms For Future Automotive Society


The demand of information security for automotive has substantially increased in recent years. The In-vehicle network is digitalized, and its connectivity is becoming very popular. Similar to the typical network security developed with the internet around 2000, the strong demand of cybersecurity within automotive is rapidly changing. Automotive hacking and theft caused by the flaw of security m... » read more

Week In Review: Auto, Security, Pervasive Computing


BMW, General Motors, Honda, Hyundai, Kia, Mercedes-Benz, and Stellantis will create an electric vehicle charging network, installing more than 30,000 high-powered DC charge points accessible to any cars that use Combined Charging System (CCS) or North American Charging Standard (NACS) connectors. Opening summer 2024, the network will leverage Plug & Charge technology and allow easy digital ... » read more

Week In Review: Auto, Security, Pervasive Computing


The Biden-Harris Administration announced the U.S. Cyber Trust Mark, a cybersecurity certification and labeling program to help consumers choose smart devices less vulnerable to cyberattacks. The Federal Communications Commission (FCC) is applying to register the Cyber Trust Mark with the U.S. Patent and Trademark Office and it would appear on qualifying smart products, including refrigerators,... » read more

Spectre-BHB: Speculative Target Reuse Attacks Version 1.7


In March 2022, researchers within the Systems and Network Security Group at Vrije Universiteit Amsterdam disclosed a new cache speculation vulnerability known as Branch History Injection (BHI) or Spectre-BHB. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within ... » read more

← Older posts Newer posts →