Security Breaches And The Defensive Mindset


Over the Christmas break, the biggest security breach ever came to light. It is assumed to be instigated by a foreign entity. The breach is known mostly as SolarWinds. SolarWinds produces network management software called Orion that is used by...well, almost everyone. The attackers inserted a backdoor into an Orion software update. You know how the operating system on your PC or Mac gets autom... » read more

The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes


Abstract: "Logic locking has been proposed as an obfuscation technique to protect outsourced IC designs from IP piracy by untrusted entities in the design and fabrication process. In this case, the netlist is locked by adding extra key-gates, and will be unlocked only if a correct key is applied to the key-gates. The key is assumed to be written into a non-volatile memory after the fabricati... » read more

Manufacturing Bits: Dec. 7


Cybersecurity for manufacturing The University of Texas at San Antonio (UTSA) has launched a center to address cybersecurity issues in the U.S. manufacturing sector. The center, called the Cybersecurity Manufacturing Innovation Institute (CyManII), is a $111 million public-private partnership. As part of the effort, UTSA will enter into a five-year corporative agreement with the U.S. Depart... » read more

Safeguarding Automotive Electronics


Modern automobiles can have up to 100 Electronic Control Units (ECUs) depending on their class, make, and model, with the number of ECUs rising even higher in the case of electric vehicles. An ECU is an embedded system in the car’s electronics. They are used to control all the vehicle's functions, including engine, powertrain, transmission, brakes, suspension, dashboard, entertainment system ... » read more

Effective Configuration Of Security Tools


To do a job well, you need the right tools. But it’s just as important—perhaps even more so—to use those tools correctly. A hammer will make things worse in your construction project if you’re trying to use it as a screwdriver or a drill. The same is true in software development. The intricacies of coding and the fact that it’s done by humans means that throughout the software deve... » read more

Security Gaps In Open Source Hardware And AI


Semiconductor Engineering sat down to discuss security risks across multiple market segments with Helena Handschuh, security technologies fellow at Rambus; Mike Borza, principal security technologist for the Solutions Group at Synopsys; Steve Carlson, director of aerospace and defense solutions at Cadence; Alric Althoff, senior hardware security engineer at Tortuga Logic; and Joe Kiniry, princi... » read more

Establishing A Special Interest Group On Common Hardware Weaknesses


It seems like almost every week yet another hardware security vulnerability is announced. Just last week a team of researchers disclosed a new attack called “Platypus”, an acronym for "Power Leakage Attacks: Targeting Your Protected User Secrets.” This is another attack exploiting the simple fact that hardware sits below the conventional security abstractions and finding a vulnerability i... » read more

Disaggregation And Smarter Chips Shift Liability For Security


Semiconductor Engineering sat down to discuss security on chips with Vic Kulkarni, vice president and chief strategist at Ansys; Jason Oberg, CTO and co-founder of Tortuga Logic; Pamela Norton, CEO and founder of Borsetta; Ron Perez, fellow and technical lead for security architecture at Intel; and Tim Whitfield, vice president of strategy at Arm. What follows are excerpts of that conversation,... » read more

Who’s Got The Hot Potato?


In COVID-19 times, gathering a few friends in a circle and playing “hot potato” may sound like a dream. For car manufacturers and the automotive electronics supply chain, handling the cybersecurity hot potato is not quite a nightmare but certainly not a fun game. Companies like Volkswagen, Fiat, and Ford have much expertise in managing a complex supply chain and post-sale support. Most car ... » read more

Dealing With Security Holes In Chips


Semiconductor Engineering sat down to discuss security risks across multiple market segments with Helena Handschuh, security technologies fellow at Rambus; Mike Borza, principal security technologist for the Solutions Group at Synopsys; Steve Carlson, director of aerospace and defense solutions at Cadence; Alric Althoff, senior hardware security engineer at Tortuga Logic; and Joe Kiniry, princi... » read more

← Older posts Newer posts →