Hardware-Based Methodology To Protect AI Accelerators


A technical paper titled “A Unified Hardware-based Threat Detector for AI Accelerators” was published by researchers at Nanyang Technological University and Tsinghua University. Abstract: "The proliferation of AI technology gives rise to a variety of security threats, which significantly compromise the confidentiality and integrity of AI models and applications. Existing software-based so... » read more

Secure NFC-Based Wireless Battery Management System


A new technical paper titled "Wireless BMS Architecture for Secure Readout in Vehicle and Second life Applications" was published by researchers at TU Graz and NXP. Abstract "Battery management systems (BMS) are becoming increasingly important in the modern age, where clean energy awareness is getting more prominent. They are responsible for controlling large battery packs in modern elect... » read more

Autonomous Vehicles: Not Ready Yet


The swirl of activity around L4 and L5 vehicles has yet to result in a successful demonstration of an autonomous vehicle that can navigate the streets of a city or highway without incident, and there is a growing body of real-world data showing that much work still needs to be done. Robo-taxi trials in big cities such as San Francisco, Los Angeles, and soon San Diego, are proving that autono... » read more

Designing Automotive ICs For Cybersecurity


The day has already arrived when we need to be concerned about the cybersecurity of our cars. An average modern car includes about 1400 ICs and many of them are used in sophisticated applications, like autonomous driving and vehicle-to-everything (V2X) communication. The security of road vehicles is an important issue to automakers and OEMs but is rooted in the IC devices that power the vehicle... » read more

Protecting Highly Confidential Data In IoT Devices


How should we approach the protection of highly confidential security parameters and personal data? It's just like our daily routines: when we leave home, we lock the door and take care not to lose the key. Similarly, in the realm of cybersecurity, safeguarding cryptographic keys is paramount. No matter how robust your data protection system is, it's rendered ineffective if keys or passwords... » read more

Texas: Cybersecurity Workforce Resilience And eCTF Success


Workforce resilience, the ability to adapt and recover from challenges, is a MITRE Engenuity priority. To ensure a resilient cybersecurity workforce that can defend organizations and the entire nation, we know that future professionals need to be interested in the field. As such, each year we proudly present Embedded Capture the Flag (eCTF), a two-phase competition for students to both test an... » read more

Die-To-Die Security


Security concerns are growing as more chiplets or die are added into a package. There are more possible attack points, and data is becoming increasingly valuable, which makes a successful attack much more lucrative than in the past. Mike Borza, Synopsys scientist, talks about the impact of heterogeneous integration on security, what the risks are for multi-tenant data centers, and what happens ... » read more

Quantum Plus AI Widens Cyberattack Threat Concerns


Quantum computing promises revolutionary changes to the computing paradigm that the semiconductor industry has operated under for decades, but it also raises the prospect of widespread cybersecurity threats. Quantum computing cyberattacks will occur millions of times faster than any assault conventional computing can muster. And while quantum computing is in an early stage of development, ex... » read more

The Threat Of Supply Chain Insecurity


Concerns about counterfeit chips are growing as more chips are deployed in safety- and mission-critical applications, prompting better traceability and new and inexpensive solutions that can determine if chips are new or used. But some counterfeit chips still slip through, and the problem gets worse wherever there are shortages. Estimates vary widely for how much counterfeiting costs in term... » read more

Securing Chip Manufacturing Against Growing Cyber Threats


Semiconductor manufacturers are wrestling with how to secure a highly specialized and diverse global supply chain, particularly as the value of their IP and their dependence upon software increases — along with the sophistication and resources of the attackers. Where methodologies and standards do exist for security, they often are confusing, cumbersome, and incomplete. There are plenty of... » read more

← Older posts Newer posts →