LLMs Show Promise In Secure IC Design


The introduction of large language models into the EDA flow could significantly reduce the time, effort, and cost of designing secure chips and systems, but they also could open the door to more sophisticated attacks. It's still early days for the use of LLMs in chip and system design. The technology is just beginning to be implemented, and there are numerous technical challenges that must b... » read more

2024 Open Source Security And Risk Analysis Report


This report offers recommendations to help creators and consumers of open source software manage it responsibly, especially in the context of securing the software supply chain. Whether a consumer or provider of software, you are part of the software supply chain, and need to safeguard the applications you use from upstream as well as downstream risk. In the following pages, we e... » read more

Memory-Based Cyberattacks Become More Complex, Difficult To Detect


Memories are becoming entry points for cyber attacks, raising concerns about system-level security because memories are nearly ubiquitous in electronics and breaches are difficult to detect. There is no end in sight with hackers taking aim at almost every consumer, industrial, and commercial segment, and a growing number of those devices connected to the internet and to each other. According... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive, Mobility Hyundai announced all of its vehicles will be software-defined vehicles (SDVs) by 2025. The company said all newly launched Hyundai vehicles will be able to receive over-the-air software updates next year, and that it expects to register 20 million vehicles to its Connected Car Services system by 2025. Hyundai also said it will invest the equivalent of more than $12 billio... » read more