Top Stories
Memory-Based Cyberattacks Become More Complex, Difficult To Detect
Techniques are constantly changing, making memory protection an increasing challenge.
AI Feeds Vision Processor, Image Sensor Boom
AI-boosted vision processing and image sensors are providing strong building blocks for image system processing.
Post-Quantum And Pre-Quantum Security Issues Grow
Experts fear secure data harvested today will be compromised in the future when quantum computing is mainstream.
Weird Incidents Reveal L5 Challenges
Overcoming glitches and consumer reluctance will require disruptive technology.
Improving Reliability In Automobiles
Focus turns toward predictive and preventive maintenance, with an emphasis on resiliency and recovery rather than maintenance schedules.
Blogs
Rambus’ Marcel van Loon warns that connected devices contain a wealth of information that is of great interest to attackers, in Security Solutions In A World Of IoT Devices.
Siemens EDA’s Jacob Wiltgen and Patmos Engineering Services’ Michelle Lange and Tammy Reeve explain how to ensure tools can perform a design or verification activity to an acceptable level of confidence, in What You Need To Know About Qualifying Tools For DO-254 Programs.
Riscure’s Jasper van Woudenberg highlights research from the Black Hat conference about a side-channel attack on a Starlink terminal, in Glitched On Earth By Humans.
Arteris IP’s Frank Schirrmeister makes sense of the many automotive safety standards and requirements, in Are We Too Hard On Artificial Intelligence For Autonomous Driving?
Cadence’s Steve Brown finds no signs of a RISC-V adoption slowdown, from deeply embedded to HPC, in RISC-V Is Thriving: Here’s What You Need To Know.
Infineon’s Danie Schneider says smart buildings depend on the ability to understand who is in a space and how they move, in Comfortable, Safe, And Energy-Efficient Homes And Buildings.
Synopsys’ Dana Neustadter looks at how high-performance, low-latency memory encryption preserves performance while protecting data, in Secure Interfaces In An Increasingly Connected World.
Sponsor White Papers
How Do You Qualify Tools For DO-254 Programs?
Nuances of tool assessment and qualification.
Can Matter Finally Crack The Smart Home?
How a smart home system can benefit from Matter.
Expansion Of The IoT Brings New Security Challenges
Mixing 5G tech with IoT has some unintended security consequences that can be avoided by being intentional about testing with a generational fuzzer.
PCB Design From Start To Finish: E-Book
A step-by-step guide to circuit board design with information suitable to beginners and graduate-level users.
Newsletter Signup
Find our email newsletter signup page here.