Automotive Security Shifts To The System Level


Cars are getting smarter, more complicated, and more vulnerable to cyberattacks. As the amount of semiconductor and software content continues to increase, so does the number of over-the-air updates and connections to edge-based servers and services, adding a variety of new vectors for attacks. Properly securing vehicles requires engineers to first identify all the possible connection points... » read more

GaN Power Semiconductors – 2025 Predictions


GaN power semiconductors are on a tremendous growth trajectory. GaN is on its way to reaching more tipping points in its adoption in more industries. Consumer chargers and adapters have been the forerunner, more applications are expected to tip this year, with many others to follow in time. Still, there are some headwinds for GaN to reach this adoption level. Why is that and how can we overcome... » read more

Securing FPGAs Beyond the Bitstream


FPGAs are a popular solution for low-volume applications and applications where frequent updates are essential to the value of the solution, as in many aerospace and defense and AI applications. Security is a critical part of FPGA solutions, and FPGA providers have invested much effort into securing the bitstream. However, there is a need for a cryptographic solution for FPGAs beyond the bitstr... » read more

Beyond Simulation: Transforming Early IC Design With Insight Analyzer


Traditional verification methods are proving inadequate for addressing critical reliability challenges in today's increasingly complex integrated circuit (IC) designs. Modern IC design requires a proactive approach to verification that emphasizes early-stage analysis. The shift-left methodology enables earlier identification of potential design risks, addressing the complex challenges of IP blo... » read more

Automotive OEMs Face Multiple Technology Adoption Challenges


Experts At The Table: The automotive ecosystem is in the midst of significant change. OEMs and tiered providers are grappling with how to deal with legacy technology while incorporating ever-increasing levels of autonomy, electrification, and software-defined vehicle concepts, just to name a few. Semiconductor Engineering sat down to discuss these and other related issues with Wayne Lyons, seni... » read more

Cryptography Does Not Equal Security


At Rambus, we often receive RFIs, RFPs and RFQs for security silicon IP cores to be used in our customer’s next semiconductor product. Such requests often contain a long shopping list of required cryptographic algorithms, their modes of operation, their key lengths or strengths and performance and sizing requirements. Depending on the target segment, additional requirements such as robustness... » read more

Edge And IoT Security Turning A Corner


Security is beginning to improve for a wide range of IoT and edge devices due to better tools, the implementation of new standards and methodologies, and an increasing level of collaboration and communication across different market segments that in the past had little or no interaction. Until recently, many vendors in cost-sensitive markets offered the bare minimum of security. To make matt... » read more

How Software-Defined Vehicles Change Auto Chip Design


The shift to software-defined vehicles is changing nearly every aspect of automotive design, from what hardware is added into vehicles, when it gets added, and what gets left behind. Moving key features to software rather than hardware allows carmakers to bring new features to market faster, at a lower cost, and to modify those features more quickly. It is also expected to drive up the value... » read more

ISO 26262’s Importance Widens Beyond Automotive


The ISO 26262 standard, which has become a mainstay since the trend toward vehicle electrification really took root a decade ago, is starting to gain traction in markets outside of automotive chip and system design. At the center of this expansion is a focus on safety under a variety of conditions — extreme temperatures, unexpected vibration, or a collision that is unavoidable. This includ... » read more

Averting Hacks Of PCIe Transport Using CMA/SPDM


This paper describes the component measurement and authentication (CMA) and security protocol and data model (SPDM) flow used to establish the secure channels required for the transmission of encrypted packets. The various approaches, namely the symmetric and asymmetric flows, will be discussed in establishing a secure connection with the implementation of CMA/SPDM packets through data objects.... » read more

← Older posts Newer posts →