Secure Your SoC From Side Channel Attacks With Adaptable Security


Many SoC and ASIC manufacturers rely heavily on cryptographic solutions to safeguard sensitive IP and data transmission within their devices. In a dynamic landscape where threats from attackers continue to evolve, encryption algorithms play a crucial role in fortifying defenses. Hackers today are leveraging advanced physical tactics that extend beyond traditional data interception, posing signi... » read more

Strategies For Defense Against Fuxnet ICS Malware


According to recent cybersecurity media reports, a new destructive ICS malware named Fuxnet has been discovered. This incident is allegedly linked to the Blackjack hacker group, which is associated with Ukrainian security agencies. It involved a major attack on Moscollector, a Moscow-based company responsible for managing critical infrastructure such as water supply, sewage treatment, and com... » read more

Can Your Doorbell Be Spoofed?


Voice anti-spoofing is a set of techniques designed to prevent scam attempts that involve mimicked voices and improve the overall UI/UX experience of VUI systems by preventing accidental triggers. These techniques are particularly important to prevent issues related to: Speech Synthesis (SS): This type of attack employs a computer-simulated voice Voice Conversion (VC): In this attack,... » read more

Advancing Product Performance Through Adaptable Production Test Equipment


Semiconductors are the backbone of modern electronics, powering everything from smartphones and laptops to autonomous vehicles and advanced medical equipment. As the semiconductor industry continues to push technological boundaries to deliver faster, smaller, and more powerful devices, ensuring the reliability and optimal performance of these components becomes increasingly challenging. A modu... » read more

Overcoming Chiplet Integration Challenges With Adaptability


Chiplets are exploding in popularity due to key benefits such as lower cost, lower power, higher performance and greater flexibility to meet specific market requirements. More importantly, chiplets can reduce time-to-market, thus decreasing time-to-revenue! Heterogeneous and modular SoC design can accelerate innovation and adaptation for many companies. What’s not to like about chiplets? Well... » read more

Enhancing HMI Security: How To Protect ICS Environments From Cyber Threats


HMIs (Human Machine Interfaces) can be broadly defined as just about anything that allows humans to interface with their machines, and so are found throughout the technical world. In OT environments, operators use various HMIs to interact with industrial control systems in order to direct and monitor the operational systems. And wherever humans and machines intersect, security problems can ensu... » read more

General-Purpose 32-bit RISC-V MCU Core Expands Design Freedom


The microcontroller sector is evolving in an exciting direction by providing designers with a growing menu of choices tailored to their performance and power requirements. Unlike the classic 1990s debate between the merits of x86 (CISC) and PowerPC (RISC) CPU architectures, there is plenty of room under the MCU tent for competing – and complementary – processor cores. The common denominator... » read more

The Need For Speed: Wi-Fi 7 And The Era Of Ultra-Fast Internet


The exponential growth of data consumption and the proliferation of connected devices have driven the need for the development of Wi-Fi 7. With the increasing demand for high-speed internet access, especially in bandwidth-intensive applications such as streaming, gaming, and virtual reality, existing wireless standards have become inadequate to meet the evolving needs of users. Wi-Fi 7 addresse... » read more

Why Semiconductor Security Is More Important Than Ever in 2024


When I think about the state of semiconductor security today compared to when I joined Cycuity in 2020, I can safely say that chip security conversations are now taking place with greater frequency and urgency. Over the past year, I observed three trends that I expect will continue and accelerate in 2024: Continued occurrence of new and increasingly sophisticated cyber incidents Emergen... » read more

Maximize SoC Compatibility With Flexible Pre- And Post-Processing


Building ASICs and custom ICs (integrated circuits) is becoming increasingly challenging. To create successful products with long-lasting market impact, it's essential for the critical IP to be differentiated by performance, power, and features. It is difficult to predict and design for every potential application, especially considering each application has unique interfaces and processing req... » read more

← Older posts Newer posts →