Week In Review: Auto, Security, Pervasive Computing


The head of the U.S. National Transportation Safety Board (NTSB), Jennifer Homendy, voiced concern about the impact of heavier electric vehicles (EVs) will have in crashes with smaller cars with internal combustion engines (ICEs). Homendy compared the weight of the GMC Hummer and the Ford F-150’s EV to ICE version and found the EVs are 2,000 to 6,000 pounds heavier. The extra weight in EVs is... » read more

The Good And Bad Of Bi-Directional Charging


Auto OEMs are starting to offer bi-directional charging in EVs, allowing batteries to power homes during outages or wherever else it is needed, and to smooth out any hiccups in the grid. But this technology also can shorten the lifetime of batteries, and it can open the door to more cyberattacks. The idea behind bi-directional charging is simple enough. EVs can store huge amounts of power, a... » read more

Week In Review: Auto, Security, Pervasive Computing


This was a tough week for cybersecurity. Chinese researchers claim to have figured out a way to crack some of the most advanced security algorithms with only 372 physical qubits, versus millions of qubits as previously theorized. This can be used to both speed up quantum decryption and to create large integers that can withstand future attacks. If it proves out, that approach would significantl... » read more

Architecting Hardware Protection For Data At Rest, In Motion, And In Use


Planning the security architecture for any device begins with the security threat model. The threat model describes the types of attacks that the device or application may face and needs to be protected against. It is based on what attackers can do, what level of control they have over the product (i.e., remote, or direct access), and how much money and effort they are willing and able to spend... » read more

Shifting Toward Software-Defined Vehicles


Apple reportedly is developing a software-defined vehicle. But so are Renault, Hyundai, General Motors, and just about everyone else. Some of the benefits of SDVs include increased comfort, convenience, safety, reliability, and remote software and firmware updates. Preventive and predictive maintenance, and remote diagnostics, can be done more conveniently over the air, while vehicle behavio... » read more

Integrating 16nm FPGA Into 28/22nm SoC Without Losing Speed Or Flexibility


Systems companies like FPGA because it gives parallel processing performance that can outdo processors for many workloads and because it can be reconfigured when standards, algorithms, protocols or customer requirements change. But FPGAs are big, burn a lot of power and are expensive. Customers would like to integrate them into their adjacent SoC if possible. Dozens of customers are now u... » read more

Formal Verification Of AI Processor Datapaths In Automotive Applications


There aren’t many electronic applications that require correctness, safety, and security more than automobiles and other road vehicles. Owners rely on their cars operating properly and reliably at all times. The very lives of drivers, passengers, and those nearby are at risk if a vehicle misbehaves. The situation grows more serious with every innovation in automotive electronics. With a mo... » read more

Software-Defined Vehicles: The Automotive Revolution With Silicon At Its Heart


The automotive sector is undergoing immense change. The retirement of the internal combustion engine (ICE) in favor of electrified powertrains and a shift towards autonomy has provided carmakers the opportunity to reimagine and redefine the entire automotive experience: how a car looks, works, and behaves, from the tires up. But such change isn’t easy. An industry founded on the manufactur... » read more

Shortening Network-on-Chip Development Schedules Using Physical Awareness


Taking physical design into account as early as possible has been a consideration of chip development teams for quite some time. Still, in interactions with customers and partners, 2022 marked a sharp uptick in concerns about whether a design that may be functionally correct can also be implemented using physical implementation flows. Given the intricacies and complexity of network-on-chip (NoC... » read more

How Secure Are RISC-V Chips?


When the Meltdown and Spectre vulnerabilities were first uncovered in 2018, they heralded an industry-wide shift in perspective regarding processor security. As the IBM X-Force Threat Intelligence Index put it the following year, "2018 ushered in a new era of hardware security challenges that forced enterprises and the security community to rethink the way they approach hardware security." R... » read more

← Older posts Newer posts →