Why Semiconductor Security Is More Important Than Ever in 2024


When I think about the state of semiconductor security today compared to when I joined Cycuity in 2020, I can safely say that chip security conversations are now taking place with greater frequency and urgency. Over the past year, I observed three trends that I expect will continue and accelerate in 2024: Continued occurrence of new and increasingly sophisticated cyber incidents Emergen... » read more

How To Stop Row Hammer Attacks


Row hammer is a well-publicized target for cyberattacks on DRAM, and there have been attempts to stop these attacks in DDR4 and DDR5, but with mixed results. The problem is that as density increases, distance decreases, making it more likely that flipped bit cell in one row can disturb a bit cell in another, and that bits flipped across an entire row can flip another row. Steven Woo, fellow and... » read more

How Secure Are FPGAs?


The unique hybrid software/hardware nature of FPGAs makes them tempting targets for cyberattacks, while also enabling them to rebuff attacks and change the attack surface before significant damage can be done. But it's becoming increasingly challenging to address all the potential vulnerabilities. FPGAs are often included in larger systems, each with their own unique attack vectors as well a... » read more

Adding Security Into Test


Security is becoming a much bigger concern as more electronics are added into cars, as more devices are connected to the internet, and as the value of data continues to increase. The problem is that security is dynamic. It continues to change throughout the lifetime of a system, and some of these devices are expected to last for a decade or more. Lee Harrison, director of Tessent product market... » read more

Auto Cyberattacks Becoming More Widespread


As vehicles become smarter, more complex, and increasingly connected, they also become more prone to cyberattacks. The challenge now is to keep pace with hackers, who are continually devising new and innovative ways to attack both software and hardware in vehicles. Recent statistics bear this out. In 2022, there was a big spike in deep/dark web activity and incidents related to application p... » read more

Semiconductor Manufacturing: Tradeoffs Between Performance, Energy Consumption & Cybersecurity Controls


A new research paper titled "Simulating Energy and Security Interactions in Semiconductor Manufacturing: Insights from the Intel Minifab Model" was published by researchers at Idaho National Laboratory, University of Texas at Austin, University of Texas at San Antonio and George Mason University. Abstract: "Semiconductor manufacturing is a highly complex. Fabrication plants must deal with r... » read more

Telecare Challenges: Secure, Reliable, Lower Power


The adoption of telecare using a variety of connected digital devices is opening the door to much more rapid response to medical emergencies, as well as more consistent monitoring, but it also is adding new challenges involving connectivity, security, and power consumption. Telecare has been on the horizon for the better part of two decades, but it really began ramping with improvements in s... » read more

Complex Chips Make Security More Difficult


Semiconductor supply chain management is becoming more complex with many more moving parts as chips become increasingly disaggregated, making it difficult to ensure where parts originated and whether they have been compromised before they are added into advanced chips or packages. In the past, supply chain concerns largely focused primarily on counterfeit parts or gray-market substitutions u... » read more

Health Care Is Gold Mine For Hackers


Today’s digital health care systems are facing relentless cyberattacks, which are targeting health care organizations as well as the medical devices they use. The critical nature and size of the U.S. health care market — an estimated $3.5 trillion in 2020, with substantial growth anticipated — make it a favorite target of hackers. Vanson Bourne conducted a survey for Sophos in early 20... » read more

FortifyIQ: Hardware Security Verification


What’s the best way to protect against side-channel attacks? FortifyIQ believes the answer lies at least partly in the verification process. Side channel and fault-injection attacks have been garnering more attention lately as hackers continue to branch out from software to a combination of software and hardware. This is especially worrying for safety-critical applications, such as automot... » read more

← Older posts