Top Stories
Verifying Side-Channel Security Pre-Silicon
Complexity and new applications are pushing security much further to the left in the design flow.
Machine Learning Showing Up As Silicon IP
It won’t replace ML chips, but it could broaden the market.
Why Banks Should Be More Worried About Security
The global financial fortresses are cracking; much work needs to be done to fix these systems.
What Else Can You Do While Driving A Car?
New vehicle designs will include many features determined by the end customer, and the list grows longer as vehicles become more autonomous.
Tech Talk
Why Traceability Matters
Staying on track with initial specs in complex heterogeneous designs.
Blogs
Arteris IP’s Guillaume Boillet digs into planning and compromises between software and hardware, in Where Do Memory Maps Come From?
Rambus’ Bart Stevens shows how resisting side-channel attacks starts with a proper security threat assessment, in DPA Countermeasures Done Right.
Tortuga Logic’s Anders Nordstrom recommends translating hardware CWEs into security rules for regression runs, in Hardware Security Optimization With MITRE CWE.
Cadence’s Paul McLellan presents some big ideas that could shape the Internet’s next decade, in Internet Tech Trends For 2022.
Infineon’s Jaeeul Yeon lays out how to ensure a package’s isolation characteristics are sufficient for environmentally harsh conditions, in Higher Creepage And Clearance Make For More Reliable Systems.
AMD’s Ed Rebello looks at optimizing servers for the requirements of the current task, in Building Multipurpose Systems With Dynamic Function Exchange Part Three: Tools For Deploying DFX.
Synopsys’ Omar Cruz focuses on preventing malicious attacks while mitigating systematic and random faults, in Meet Both Security And Safety Needs In New Automotive SoCs.
Sponsor White Papers
Manufacturing Cyber Security
How to protect data in a digital thread.
Revolution In Embedded Security
How security tools help in tackling the new embedded security challenges of device and silicon manufacturers.
Meeting Stringent CO2 Building Code Requirements
The smallest CO2 sensor to meet California’s Building Code Title 24 requirements.
2021 Software Vulnerability Snapshot
What vulnerabilities are most common in commercial software, and why relying solely on automated security tests can leave organizations at risk to cyberattacks and data breaches.
Open RAN Direct RF Sampling Radio Transceiver Architectures For Massive MIMO
Using programmable and fully configurable cloud-RAN components is essential in migrating networks toward virtualization and SDN control.
Newsletter Signup
Find our email newsletter signup page here.