Week In Review: Design, Low Power


Tortuga Logic was awarded a $12 million SBIR Phase III contract from the US Government to foster the development of advanced hardware security solutions. Ansys will collaborate with Tortuga Logic to advance side-channel leakage analysis workflows. “The award will allow us to rapidly expand our solution to address new classes of hardware weaknesses in the physical domain that are critical to t... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive/Mobility Apple wants to have self-driving cars in production by 2024, and that timeframe includes having its own battery technology, according to Reuters. Project Titan, the name of Apple’s automotive efforts, has seen its ups and downs, but now Apple has a clearer view of what its strength and niche will be — consumer self-driving cars with a longer range, less expensive batter... » read more

Why It’s So Hard To Stop Cyber Attacks On ICs


Semiconductor Engineering sat down to discuss security risks across multiple market segments with Helena Handschuh, security technologies fellow at Rambus; Mike Borza, principal security technologist for the Solutions Group at Synopsys; Steve Carlson, director of aerospace and defense solutions at Cadence; Alric Althoff, senior hardware security engineer at Tortuga Logic; and Joe Kiniry, princi... » read more

New Security Approaches, New Threats


New and different approaches to security are gaining a foothold as the life expectancy for advanced chips increases, and as emerging technologies such as quantum computing threaten to crack even the most complex encryption schemes. These approaches include everything from homomorphic encryption, where data is processed without being decrypted, to different ways of sending and receiving data ... » read more

Test Engineers In Very Short Supply


Semiconductor design, verification, manufacturing, and test requires an army of engineers, with each playing a special role. But increasingly, these disciplines also require additional training to be able to understand the context around their jobs, and that is making it harder to fill different positions at a time when the chip industry already is severely short-staffed. This is particularl... » read more

Blockchain Attempts To Secure The Supply Chain


Blockchain technology is starting to be deployed more widely In the battle against counterfeiting, often coupled with component IDs to allow device authentication. Securing the supply chain is a complex challenge, particularly as more IP from more vendors in more locations makes its way into chips, packages or even systems. Being able to attest to the history of the device to prove its prove... » read more

Detecting And Preventing Automotive Hardware Security Vulnerabilities


In this new whitepaper, you will learn: How to detect and prevent hardware security vulnerabilities in automotive applications with Tortuga Logic’s Radix See how using Radix, as part of your Automotive Security Development Lifecycle, automates and enables a security signoff methodology Click here to read white paper. » read more

MPU Vs. MCU


There was a time when microprocessors and microcontrollers were distinct devices. There was never a question as to which one you were dealing with. But changes in the memory architecture have muddied the distinction in modern devices. There are a number of ways in which microprocessors and microcontrollers could possibly be differentiated. But there is no universal agreement as to how that s... » read more

Security Gaps In Open Source Hardware And AI


Semiconductor Engineering sat down to discuss security risks across multiple market segments with Helena Handschuh, security technologies fellow at Rambus; Mike Borza, principal security technologist for the Solutions Group at Synopsys; Steve Carlson, director of aerospace and defense solutions at Cadence; Alric Althoff, senior hardware security engineer at Tortuga Logic; and Joe Kiniry, princi... » read more

Establishing A Special Interest Group On Common Hardware Weaknesses


It seems like almost every week yet another hardware security vulnerability is announced. Just last week a team of researchers disclosed a new attack called “Platypus”, an acronym for "Power Leakage Attacks: Targeting Your Protected User Secrets.” This is another attack exploiting the simple fact that hardware sits below the conventional security abstractions and finding a vulnerability i... » read more

← Older posts Newer posts →