A guide to aid conversion from CWEs to Security Rules for use with Radix security verification tools.
MITRE’s hardware Common Weakness Enumeration (CWE) database aggregates hardware weaknesses that are the root causes of vulnerabilities in deployed parts. A complete list can be found on the MITRE Hardware Design Webpage. Hardware CWEs are ideal to be used alongside internally developed security requirements databases and have been developed and submitted by both government and commercial design teams such as the Intel Corporation and Tortuga Logic. This guide can be used in conjunction with the CWE list as a resource to aid conversion from CWEs to Security Rules for use with Tortuga Logic’s Radix security verification tools. It also serves as a guide for design and verification teams to help them answer the question: “what security vulnerabilities should I verify?”
Click here to read more.
New interconnects and processes will be required to reach the next process nodes.
Servers today feature one or two x86 chips, or maybe an Arm processor. In 5 or 10 years they will feature many more.
After failing in the fab race, the country has started focusing on less capital-intensive segments.
Rowhammer attack on memory could create significant issues for systems; possible solution emerges.
Aging, adaptation, and new processes and technology require big changes on every level.
Gate-all-around FETs will replace finFETs, but the transition will be costly and difficult.
An upbeat industry at the start of the year met one of its biggest challenges, but instead of being a headwind, it quickly turned into a tailwind.
The backbone of computing architecture for 75 years is being supplanted by more efficient, less general compute architectures.
Rising costs, complexity, and fuzzy delivery schedules are casting a cloud over next-gen lithography.
New approaches to preventing counterfeiting across the supply chain.
Challenges range from constant security updates to expected lifetimes that last beyond the companies that made them.
New interconnects and processes will be required to reach the next process nodes.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
Leave a Reply