Securing Data In Heterogeneous Designs


Data security is becoming a bigger concern as chips are disaggregated into chiplets and various third-party IP blocks. There is no single solution that works for all designs, and no single tool or methodology that addresses everything in any design. Data is being transmitted across time zones, political borders, and even across multiple designs. Laws and the need to comply with standards may... » read more

Automotive Intrusion Detection Methodologies (TU Denmark)


A new technical paper titled "Intrusion Detection in the Automotive Domain: A Comprehensive Review" was published by researchers at DTU Compute Technical University of Denmark Abstract "The automotive domain has realized amazing advancements in communication, connectivity, and automation— and at a breakneck pace. Such advancements come with ample benefits, such as the reduction of traffic... » read more

Building Security Into ICs From The Ground Up


Cyberattacks are becoming more frequent and more sophisticated, but they also are starting to compromise platforms that until recently were considered unbreakable. Consider blockchains, for example, which were developed as secure, distributed ledger platforms. All of them must be updated with the same data for a transaction to proceed. But earlier this year a blockchain bridge platform calle... » read more

Internet Tech Trends For 2022


Every year at the start of the year, Benedict Evans produces a big presentation on trends in technology, internet, mobile, and so on. He used to live in the US and did this for Andreesen-Horowitz (a16z), but he has since returned to Britain (he's English) and I think has his own consulting company. This year's presentation is titled "Three Steps to the Future." The most exciting themes in t... » read more

Electronics Supply-Chain Trust Standards Emerge


Creative new ideas for electronics supply-chain trust are in rich supply, whether securing identity, protecting logistics, or establishing provenance. But underlying these efforts are wide-ranging standards in development from a broad set of organizations. Today, no one-stop-shop for supply-chain standards exists. Instead, there is huge fragmentation. It can be difficult to identify all of t... » read more

Blockchain Attempts To Secure The Supply Chain


Blockchain technology is starting to be deployed more widely In the battle against counterfeiting, often coupled with component IDs to allow device authentication. Securing the supply chain is a complex challenge, particularly as more IP from more vendors in more locations makes its way into chips, packages or even systems. Being able to attest to the history of the device to prove its prove... » read more

New And Innovative Supply Chain Threats Emerging


The electronics supply chain is seeing evidence of increased sophistication in the counterfeiting of complex ICs and simple passives, both of which can impact the functioning and safety of the systems that use them. New technologies are being developed to build trust by helping to identify counterfeit devices before assembly and during failure analysis. It's too early to tell how effective t... » read more

Who’s Watching The Supply Chain?


Every company developing chips at the most advanced process nodes these days is using different architectures and heterogeneous processing and memory elements. There simply is no other way to get the kind of power/performance improvements needed to justify the expense of moving to a new process node. So while they will reap the benefits of traditional scaling, that alone is no longer enough. ... » read more

Combating Counterfeit Semiconductors In The Military Supply Chain


The reality: semiconductors are often counterfeits. In most current implementations, semiconductor authenticity is practically impossible to guarantee. The counterfeit market for semiconductors is real, sizable and growing: • 2012: According to a report produced by the Senate Armed Services Committee, more than 1,000,000 suspect counterfeit electronic components have been used in 1,800 sep... » read more

Week in Review: IoT, Security, Autos


Products/Services Huawei Technologies is again delaying the public introduction of its Mate X foldable smartphone. It is unlikely the product will be marketed in the U.S., given the ongoing trade war. The official rollout now seems likely to come in November, in time for the holiday shopping season. Samsung Electronics has had its problems with foldable phones, yet those were due to manufactur... » read more

← Older posts