Why Semiconductor Security Is More Important Than Ever in 2024


When I think about the state of semiconductor security today compared to when I joined Cycuity in 2020, I can safely say that chip security conversations are now taking place with greater frequency and urgency. Over the past year, I observed three trends that I expect will continue and accelerate in 2024: Continued occurrence of new and increasingly sophisticated cyber incidents Emergen... » read more

Cybersecurity Metrics: The Path To OT Security Maturity


In 2023, the cybersecurity challenges in the Operational Technology (OT) and Industrial Control Systems (ICS) landscape reached unprecedented levels. Ransomware, increasingly prevalent through new Ransomware-as-a-Service (RaaS) models, became a widespread and costly headache. While some might argue this exaggerates the risk, the growing demand for defenses is not overstated. 2024 continues to b... » read more

FeFET Memory Encrypted Inside The Storage Array


A new technical paper titled "Embedding security into ferroelectric FET array via in situ memory operation" was published by researchers at Pennsylvania State University, University of Notre Dame, Fraunhofer IPMS, National University of Singapore, and North Dakota State University. Abstract "Non-volatile memories (NVMs) have the potential to reshape next-generation memory systems because of... » read more

Hardware-Based Methodology To Protect AI Accelerators


A technical paper titled “A Unified Hardware-based Threat Detector for AI Accelerators” was published by researchers at Nanyang Technological University and Tsinghua University. Abstract: "The proliferation of AI technology gives rise to a variety of security threats, which significantly compromise the confidentiality and integrity of AI models and applications. Existing software-based so... » read more

Secure NFC-Based Wireless Battery Management System


A new technical paper titled "Wireless BMS Architecture for Secure Readout in Vehicle and Second life Applications" was published by researchers at TU Graz and NXP. Abstract "Battery management systems (BMS) are becoming increasingly important in the modern age, where clean energy awareness is getting more prominent. They are responsible for controlling large battery packs in modern elect... » read more

Autonomous Vehicles: Not Ready Yet


The swirl of activity around L4 and L5 vehicles has yet to result in a successful demonstration of an autonomous vehicle that can navigate the streets of a city or highway without incident, and there is a growing body of real-world data showing that much work still needs to be done. Robo-taxi trials in big cities such as San Francisco, Los Angeles, and soon San Diego, are proving that autono... » read more

Designing Automotive ICs For Cybersecurity


The day has already arrived when we need to be concerned about the cybersecurity of our cars. An average modern car includes about 1400 ICs and many of them are used in sophisticated applications, like autonomous driving and vehicle-to-everything (V2X) communication. The security of road vehicles is an important issue to automakers and OEMs but is rooted in the IC devices that power the vehicle... » read more

Protecting Highly Confidential Data In IoT Devices


How should we approach the protection of highly confidential security parameters and personal data? It's just like our daily routines: when we leave home, we lock the door and take care not to lose the key. Similarly, in the realm of cybersecurity, safeguarding cryptographic keys is paramount. No matter how robust your data protection system is, it's rendered ineffective if keys or passwords... » read more

Texas: Cybersecurity Workforce Resilience And eCTF Success


Workforce resilience, the ability to adapt and recover from challenges, is a MITRE Engenuity priority. To ensure a resilient cybersecurity workforce that can defend organizations and the entire nation, we know that future professionals need to be interested in the field. As such, each year we proudly present Embedded Capture the Flag (eCTF), a two-phase competition for students to both test an... » read more

Die-To-Die Security


Security concerns are growing as more chiplets or die are added into a package. There are more possible attack points, and data is becoming increasingly valuable, which makes a successful attack much more lucrative than in the past. Mike Borza, Synopsys scientist, talks about the impact of heterogeneous integration on security, what the risks are for multi-tenant data centers, and what happens ... » read more

← Older posts