Securing FPGAs Beyond the Bitstream


FPGAs are a popular solution for low-volume applications and applications where frequent updates are essential to the value of the solution, as in many aerospace and defense and AI applications. Security is a critical part of FPGA solutions, and FPGA providers have invested much effort into securing the bitstream. However, there is a need for a cryptographic solution for FPGAs beyond the bitstr... » read more

Automotive OEMs Face Multiple Technology Adoption Challenges


Experts At The Table: The automotive ecosystem is in the midst of significant change. OEMs and tiered providers are grappling with how to deal with legacy technology while incorporating ever-increasing levels of autonomy, electrification, and software-defined vehicle concepts, just to name a few. Semiconductor Engineering sat down to discuss these and other related issues with Wayne Lyons, seni... » read more

AI Accelerators for Homomorphic Encryption Workloads


A new technical paper titled "Leveraging ASIC AI Chips for Homomorphic Encryption" was published by researchers at Georgia Tech, MIT, Google and Cornell University. Abstract: "Cloud-based services are making the outsourcing of sensitive client data increasingly common. Although homomorphic encryption (HE) offers strong privacy guarantee, it requires substantially more resources than compu... » read more

ISO 26262’s Importance Widens Beyond Automotive


The ISO 26262 standard, which has become a mainstay since the trend toward vehicle electrification really took root a decade ago, is starting to gain traction in markets outside of automotive chip and system design. At the center of this expansion is a focus on safety under a variety of conditions — extreme temperatures, unexpected vibration, or a collision that is unavoidable. This includ... » read more

SRAM PUF – The Secure Silicon Fingerprint


For many years, silicon Physical Unclonable Functions (PUFs) have been seen as a promising and innovative security technology making steady progress. Today, Static Random-Access Memory (SRAM)-based PUFs have been deployed in hundreds of millions of devices and offer a mature and viable security component that is achieving widespread adoption in commercial products. They are found in devices ran... » read more

Mastering Cyber Awareness: Training For The Digital Battlefield


In today’s digital battlefield, cyber awareness is crucial for warfighters. To effectively prepare them, it’s essential to create realistic and detailed models of mobile networks, encompassing both physical and virtual infrastructure. This is where network modeling software comes into play, offering a high-fidelity approach to enhance cyber situational awareness. A high-fidelity modeling an... » read more

CMA/SPDM—An Additional Layer of Security for PCIe Transport


In today’s data-driven world, everyone is navigating a vast ocean of information that transcends across unsecured links and can easily fall prey to digital hackers. To keep our data safe, it is crucial to beef up security and make sure that only the right users can access our data. This article dives into the world of secure communication, where component measurement and authentication (CM... » read more

Unmasking Ransomware: Key Challenges And Strategic Responses In Critical Infrastructure Sectors – A Mid-2024 Review


Since 2015, ransomware attacks have become a significant threat that organizations and enterprises cannot afford to ignore, especially as critical infrastructure sectors (CI) increasingly embrace digitalization. Due to IT and OT convergence, even OT environments have become targets for ransomware groups. In 2023, ransomware attacks were the most frequent incidents faced by OT environments, fol... » read more

Chip Security Now Depends On Widening Supply Chain


Securing chips is becoming more challenging as SoCs are disaggregated into chiplets, creating new vulnerabilities that involve hardware and software, as well as multiple entities, and extending threats across a much broader supply chain. In the past, much of the cyber threat model was confined to either hardware or software, and where multiple vendors were involved, various chips were separa... » read more

Securing The Supply Chain: CMMC Essentials For Defense Contractors In OT Cybersecurity


Since September 2020, there have been several global supply chain attacks such as SolarWinds, Kaseya, NPM IconBurst, and Cyber Av3ngers Unitronics. Many of these incidents involved nation-state actors and resulted in significant disruptions and failures. In this threat landscape, the Department of Defense and critical infrastructure sectors have frequently and repeatedly come under attack, sust... » read more

← Older posts