Fully Partitioned Security Monitoring Logic From Both The CPU’s Main Core and Privileged SW (KAIST)


A new technical paper titled "Interstellar: Fully Partitioned and Efficient Security Monitoring Hardware Near a Processor Core for Protecting Systems against Attacks on Privileged Software" was published by researchers at KAIST. The paper states "The existing approaches to instruction trace-based security monitoring hardware are dependent on the privileged software, which presents a signific... » read more

Developing Robust Finite State Machines Code With Lint Tools


As design size and complexity grows, the design verification effort grows even more. It takes significant amount of time to thoroughly verify complex control logic of a design, which is the key and the most critical component of design functionality. One of the most common design patterns in the control logic design are finite state machines. They could be designed in different styles, state an... » read more