Attacks that use CPU data cache timing to exploit and leak information could lead to arbitrary virtual memory read vulnerabilities across local security boundaries.
When Jann Horn of Google’s Project Zero posted a detailed blog titled “Reading privileged memory with a side-channel,” it set off a firestorm of activity as the post confirmed that secret information inside a computer could be accessed via two different attacks, Meltdown and Spectre. Essentially, both attacks utilize CPU data cache timing to efficiently exploit and leak information from the system. This could lead to—at worst—arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts.
Read more here.
100% inspection, more data, and traceability will reduce assembly defects plaguing automotive customer returns.
Engineers are finding ways to effectively thermally dissipate heat from complex modules.
Increased transistor density and utilization are creating memory performance issues.
Lots of unknowns will persist for decades across multiple market segments.
FPGAs, CPUs, and equipment receive funding in China; 98 startups raise over $2 billion.
Disaggregation and the wind-down of Moore’s Law have changed everything.
Increased transistor density and utilization are creating memory performance issues.
Why UCIe is so important for heterogeneous integration.
Funding rolls in for photonics and batteries; 88 startups raise $1.3B.
It depends on whom you ask, but there are advantages to both.
After years of research, chipmakers have started combining ultra low-power designs with advancements in harvesting technology.
FPGAs, CPUs, and equipment receive funding in China; 98 startups raise over $2 billion.
Some designs focus on power, while others focus on sustainable performance, cost, or flexibility. But choosing the best option for an application based on benchmarks is becoming more difficult.
Leave a Reply