Image Sensor Trained To Classify Optically Projected Images By Reading Out The Few Most Relevant Pixels


New research paper "Sparse pixel image sensor" from Institute of Photonics, Vienna University of Technology. Abstract "As conventional frame-based cameras suffer from high energy consumption and latency, several new types of image sensors have been devised, with some of them exploiting the sparsity of natural images in some transform domain. Instead of sampling the full image, those devices... » read more

Hardware Countermeasures Benchmarking against Fault Attacks


Abstract "The development of differential fault analysis (DFA) techniques and mechanisms to inject faults into cryptographic circuits brings with it the need to use protection mechanisms that guarantee the expected level of security. The AES cipher, as a standard, has been the target of numerous DFA techniques, where its security has been compromised through different formulations and types of... » read more

Complex Chips Make Security More Difficult


Semiconductor supply chain management is becoming more complex with many more moving parts as chips become increasingly disaggregated, making it difficult to ensure where parts originated and whether they have been compromised before they are added into advanced chips or packages. In the past, supply chain concerns largely focused primarily on counterfeit parts or gray-market substitutions u... » read more

Vertical MoS2 transistors with sub-1-nm gate lengths


Abstract "Ultra-scaled transistors are of interest in the development of next-generation electronic devices. Although atomically thin molybdenum disulfide (MoS2) transistors have been reported, the fabrication of devices with gate lengths below 1 nm has been challenging. Here we demonstrate side-wall MoS2 transistors with an atomically thin channel and a physical gate length of sub-1 nm ... » read more

Advances in Logic Locking: Past, Present, and Prospects


Abstract: "Logic locking is a design concealment mechanism for protecting the IPs integrated into modern System-on-Chip (SoC) architectures from a wide range of hardware security threats at the IC manufacturing supply chain. Logic locking primarily helps the designer to protect the IPs against reverse engineering, IP piracy, overproduction, and unauthorized activation. For more than a decade,... » read more

Hardware Root of Trust: Everything You Need To Know


As explained in our “Secure Silicon IP Webinar Series“, a root of trust is the security foundation for an SoC, other semiconductor device or electronic system. However, its meaning differs depending on who you ask. For example, the hardware root of trust contains the keys for cryptographic functions and is usually a part of the secure boot process providing the foundation for the software c... » read more

A Novel Multifunctional Single-Layer Adhesive Used For Both Temporary Bonding And Mechanical Debonding in Wafer-Level Packaging Applications


Temporary bonding (TB) and debonding (DB) of wafers have been widely developed and applied over the last decade in various wafer-level packaging technologies, such as package-on-package (PoP), fan-out integration, and 2.5D and 3D integration using through-silicon vias (TSVs). The materials used to achieve TB and DB are extremely critical and the industry's current best practice is the use of tw... » read more

VLSI Design Careers


If you're planning your career in the semiconductor industry, make sure you consider processor design. Now the aspiring VLSI engineers like you can implement the open-source processor RISC-V while learning from the textbooks. But why should a VLSI engineer understand the processor design? Does everyone implement the processor as an RTL designer? In this article, I will address these question... » read more

Dual Surface Architectonics for Directed Self‐Assembly of Ultrahigh‐Resolution Electronics


Abstract: "The directed self‐assembly of electronic circuits using functional metallic inks has attracted intensive attention because of its high compatibility with extensive applications ranging from soft printed circuits to wearable devices. However, the typical resolution of conventional self‐assembly technologies is not sufficient for practical applications in the rapidly evolving addi... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing — IoT, edge, cloud, data center, and back The IoT designer Deed designed a screenless health monitor, worn on the wrist, that uses IoT (Internet of Things) building blocks from Infineon Technologies. The Get bracelet interprets hand gestures for making payments, picking up phone calls, turning up or down audio, while it also takes health data and biometrics. The system us... » read more

← Older posts Newer posts →