中文 English

Making Sense Of PUFs


As security becomes a principal design consideration, physically unclonable functions (PUFs) are seeing renewed interest as new players emerge onto the market. PUFs can play a central role in hardware roots of trust (HRoTs), but the messaging in the market can make it confusing to understand the different types of PUF as well as their pros and cons. PUFs leverage some uncertain aspect of som... » read more

The MCU Dilemma


The humble microcontroller is getting squeezed on all sides. While most of the semiconductor industry has been able to take advantage of Moore's Law, the MCU market has faltered because flash memory does not scale beyond 40nm. At the same time, new capabilities such as voice activation and richer sensor networks are requiring inference engines to be integrated for some markets. In others, re... » read more

The Black Box In Auto Vehicles


Driving a modern car or truck today is like driving a complex computer system which has the scope to take people and freight from one geographic point to another through the infrastructure and, to do so, it just happens it has an engine and wheels. Among the most significant developments in automotive electronics in the last several years is the inclusion of an EDR (Event Data Recorder) in e... » read more

Intelligent Compute Engines Driving Today’s Automobiles Need Better Security


Driving a modern car or truck today is like driving a complex computer system which has the capability to transport people and freight from a geographic point to another through the road infrastructure and, to do so, it just happens it has an engine and wheels. With automotive systems moving towards consolidation of workloads, there is a need and benefit of having faster networking throughpu... » read more

Making Secure Chips For IoT Devices


Chips and modules going into Internet of Things node devices must have cybersecurity features designed and built into them. Multiple vendors are responding with products meant to keep the IoT devices protected from the cyberattacks that are becoming more common. While [getkc id="76" kc_name="IoT"] privacy remains a key concern for consumers and homeowners, IoT security has taken on top-of-mi... » read more

The Benefits Of Antifuse OTP


One-time programmable (OTP) memory is a type of non-volatile memory (NVM) that commonly comprises of electrical fuse (eFuse) and antifuse. The advantages of OTP memory over multi-time programmable (MTP) memory, such as EEPROM or flash memory, are smaller area and no additional wafer processing steps. Therefore, for many low-cost applications, the OTP memory is used to replace the MTP memory. ... » read more

Executive Insight: Charlie Cheng


[getperson id="11073" comment="Charlie Cheng"], CEO of [getentity id="22135" e_name="Kilopass Technology"], sat down with Semiconductor Engineering to talk about the limitations of DRAM, how to get around them, and who's likely to do that. What follows are excerpts of that discussion. SE: What are the top market segments from a [getkc id="22" kc_name="memory"] standpoint? Cheng: The top o... » read more

In An Election Year: OTP For IoT


Borrowing from this year’s hottest topic –– the Presidential Election –– let’s nominate one-time programmable (OTP) embedded memory for the Internet of Things (IoT). It’s sure to be the winner for any number of reasons, but most likely it is because of its built-in security features. As a memory-on-chip technology, antifuse OTP is paving the way for IoT designers to come up with n... » read more

Reduced Memory Power For Internet of Things Applications


Memory has historically been a very stable technology, whether volatile or non-volatile. Incremental change happens constantly to improve performance, but it’s unusual for a major change to take place. The non-volatile one-time-programmable memory approach that Kilopass uses has been in place for thirteen years with no major changes. Now, however, Kilopass is readying a new memory array for t... » read more

Lessons From The Cold War


With the ongoing threats to our electronic devices, it is obvious that security needs to be improved in the application and communication chips on the mobile platform. The ideal solution would be as secure as the celebrated red phone on the U.S. president’s desk in the Oval Office during the Cold War. The implementation of the red phone is actually much more complicated than red-colored ha... » read more

← Older posts