Software-Defined Vehicles


Automobiles long ago stopped being purely mechanical systems. But as more components are electrified — and, in particular, as the drivetrain is electrified — cars are becoming software-defined vehicles. Some think of such cars as computers on wheels. But as these systems continue to evolve, adding in more assisted and semi-autonomous capabilities, that comparison is looking increasingly ... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing — data center, edge, IoT, 5G Qualcomm settled its 5G licensing disagreement with Huawei, which will pay $1.8 billion in back royalties and will pay for licensing going forward. Huawei is also now the world’s largest supplier of smartphones, surpassing Samsung Electronics Co. Qualcomm also announced a super-fast charging platform this week for Android devices that is sup... » read more

Why Safety-Critical Verification Is So Difficult


The inclusion of AI chips in automotive and increasingly in avionics has put a spotlight on advanced-node designs that can meet all of the ASIL-D requirements for temperature and stress. How should designers approach this task, particularly when these devices need to last longer than the applications? Semiconductor Engineering sat down to discuss these issues with Kurt Shuler, vice president of... » read more

Managing Web Application Security With Coverity


While security practitioners can and should play an active role in web application security, only developers are familiar enough with the code to fix software vulnerabilities. For this reason, security teams can most effectively prevent software vulnerabilities from entering production by equipping their development teams with the tools to fix security issues as they’re building applications.... » read more

Why Cyberattacks Will Be No Match For Autonomous Vehicles


Malware, ransomware, viruses, denial-of-service attacks – these threats can leave a business reeling as it struggles to recover. Others might not recover at all, but that hasn’t stopped most industries from treating cybersecurity as an afterthought. Unfortunately, this is how it has been handled since the first hackers emerged. It’s only when a company is hit that other players start to r... » read more

Making Sense Of PUFs


As security becomes a principal design consideration, physically unclonable functions (PUFs) are seeing renewed interest as new players emerge onto the market. PUFs can play a central role in hardware roots of trust (HRoTs), but the messaging in the market can make it confusing to understand the different types of PUF as well as their pros and cons. PUFs leverage some uncertain aspect of som... » read more

AI Roadmap: A human-centric approach to AI in aviation


Source: EASA European Union Aviation Safety Agency February 2020 "EASA published its Artificial Intelligence Roadmap 1.0 which establishes the Agency’s initial vision on the safety and ethical dimensions of development of AI in the aviation domain. The AI Roadmap 1.0 is to be viewed as a starting point, intended to serve as a basis for discussion with the Agency’s stakeholders. It... » read more

Week In Review: Auto, Security, Pervasive Computing


AI/Edge Arm putting AI (artificial intelligence) and machine learning (ML) on the Cortex-M processor by offering IP for a microNPU for Cortex-M. The company says in a press release that it will deliver a 480x uplift in ML performance. The new Cortex-M IP is Arm Ethos-U55 NPU, which Arm says is the industry’s first microNPU (neural processing unit). Arm is hoping the new IP will start an expl... » read more

Securing Smart Connected Homes With OTP NVM IP


The market for piracy is huge and hackers have become increasingly sophisticated even when security is implemented in hardware. The race between the aggressors and protectors is a battle without end. Smart connected home devices are increasingly storing and processing very sensitive and private user data in addition to attempting to deliver copyright protected content from service providers. Pr... » read more

Determining What Really Needs To Be Secured In A Chip


Semiconductor Engineering sat down to discuss what's needed to secure hardware and why many previous approaches have been unsuccessful, with Warren Savage, research scientist in the Applied Research Laboratory for Intelligence and Security at the University of Maryland; Neeraj Paliwal, vice president and general manager of Rambus Security; Luis Ancajas, marketing director for IoT security softw... » read more

← Older posts Newer posts →