Security Risks Mount For Aerospace, Defense Applications


Supply chain and hardware security vulnerabilities affect all industries, but they pose additional risks for the defense sector. Over-manufacturing and re-manufacturing allow chips from friendly nations to end up in the weapons of adversaries. And side-channel attacks such as power analysis or fault injection, as well as internet-based distributed denial of service (DDoS) attacks, provide a mea... » read more

Identifying Sources Of Silent Data Corruption


Silent data errors are raising concerns in large data centers, where they can propagate through systems and wreak havoc on long-duration programs like AI training runs. SDEs, also called silent data corruption, are technically rare. But with many thousands of servers, which contain millions of processors running at high utilization rates, these damaging events become common in large fleets. ... » read more

E-Beam Inspection Proves Essential For Advanced Nodes


Electron-beam inspection is proving to be indispensable for finding critical defects at sub-5nm dimensions. The challenge now is how to speed up the process to make it economically palatable to fabs. E-beam inspection's notorious sensitivity-throughput tradeoff has made comprehensive defect coverage with e-beam at these advanced nodes especially problematic. For Intel’s 18A logic node (~1.... » read more

Who Is Most Likely To Link Financial And Manufacturing Data?


Experts at the Table: Semiconductor Engineering sat down to discuss which companies have the most to gain from linking financial data with manufacturing data analytics platforms with Dieter Rathei, CEO of DR Yield; Jon Holt, senior director of product management at PDF Solutions, Alex Burlak, vice president of advanced analytics and test at proteanTecs; and Dirk de Vries, technical program ma... » read more

Radiation, Temperature, Power Challenges For Chips In Space


Mission-critical hardware used in space is not supposed to fail at all, because lives may be lost in addition to resources, availability, performance, and budgets. For space applications, failure can occur due to a range of factors, including the weather on the day of launch, human error, environmental conditions, unexpected or unknown hazards and degradation of parts to chemical factors, aging... » read more

Extra Safety Measures Needed For Aerospace ICs


Aerospace safety requirements and standards vary depending on whether a spacecraft is manned or unmanned, and how crucial the mission is. The defense contractors designing these spacecraft take various approaches to functional safety based on how critical a component is for the mission to succeed. While losing a few images during an Earth-bound observation may not matter, losing a satellite ... » read more

Cyber Threats Multiply With Commercial Chiplets


The commercialization of chiplets will significantly boost the potential for attacks on hardware, requiring a much broader set of security measures and processes at every level of the supply chain, including traceability from initial design to end of life. Much progress has been made in recent years on security measures, including everything from identifying unusual data traffic inside a chi... » read more

Smarter Cars, Higher Stakes


Artificial intelligence is turbocharging automotive innovation, but it's also unleashing a tangle of high stakes risks that engineers and security experts are scrambling to contain. The push to embed AI deep into today’s vehicles is changing how cars are built, how they handle the road, and how they keep passengers safe. But as onboard intelligence expands, so do the risks. AI systems that... » read more

From Tool Agents To Flow Agents


Experts At The Table: AI is starting to impact several parts of the EDA design and verification flows, but so far these improvements are isolated to single tool or small flows provided by a single company. What is required is a digital twin of the development process itself on which AI can operate. Semiconductor Engineering sat down with a panel of experts to discuss these issues and others, in... » read more

Security Power Requirements Are Growing


Determining how much power to budget for security in a chip design is a complex calculation. It starts with a risk assessment of the cost of a breach and the number of possible attack vectors, and whether security is active or passive. Different forms of root of trust and cryptography have different power costs. Different systems could require tradeoffs between performance and security, whic... » read more

← Older posts Newer posts →