Top Stories
Chiplet Security Risks Underestimated
The magnitude of the problem for commercial chiplets is daunting.
Growing Challenges For Increasingly Connected Vehicles
OEMs have high expectations for connected vehicles and global growth opportunities, but it’s not that simple.
What’s Required To Secure Chips
There is no single solution, and the most comprehensive security may be too expensive.
How Chip Engineers Plan To Use AI
Checks, balances, and unknowns for AI/ML in semiconductor design.
IC Security Issues Grow, Solutions Lag
Signing off on hardware security may involve lifetime updates; AI adds unknowns that are difficult to trace.
Blogs
Winbond’s Adrian Cosoroaba warns that current embedded flash solutions pose significant security risks to vehicles, in The Hidden Security Risks Of Automotive Electronic Systems.
Synopsys’ Dana Neustadter and Brett Murdock contend that DDR security strategies should enable ongoing adaptation to an evolving threat ecosystem, in How To Safeguard Memory Interfaces By Design.
Rambus’ Bart Stevens explains how to ask the right questions to ensure the best protection, in Selecting The Right Root Of Trust For Your Application And Architecture.
Siemens EDA’s Lee Harrison illustrates how system visibility brings lifecycle management to SoCs, in Chip Monitoring For Max Performance And Security.
Arteris’ Frank Schirrmeister advises getting earlier but reliable estimates on timing to reduce the overall project schedule, in The Architect’s Dilemma And Closing The Loop With Implementation.
Riscure’s Jasper van Woudenberg looks at testing AI source code analysis by feeding it a C file with many known vulnerabilities, in ChatGPT Vs Security Analyst.
Flex Logix’s Geoff Tate shows the importance of using embedded FPGAs to support dozens of variations and kinds of GPIO interface protocols, in Connect To Any Chip With Programmable GPIO.
Cadence’s Veena Parthan compares model tests of a patrol ship’s hull with computational fluid dynamics, in Predicting Hull Resistance Curve Using Marine CFD.
Video
Adding Security Into Test
Configurable security strategies need to be designed into devices and monitored throughout their lifetimes.
100G Ethernet At The Edge
Reducing latency as processing moves closer to the source of data.
Programmable General-Purpose I/O
Using eFPGAs to extend the life of different blocks and reduce inventory.
Sponsor White Papers
Navigating The Intersection Of Safety And Security
A complete package for automotive silicon suppliers.
Threat Modeling, Decoded — Charting The Security Journey
Learn why threat modeling is an important step in protecting any connected system.
XENSIV PAS CO2
The contribution of a CO2 sensor to the implementation of the WELL Building Standard and of the LEED rating system.
eBook (Premium Content)
Power Semiconductors: A Deep Dive Into Materials, Manufacturing & Business
How these devices are made and work, challenges in manufacturing, related startups, as well as the reasons why so much effort and resources are being spent to develop new materials, and new processes.
Newsletter Signup
Find our email newsletter signup page here.