HW Security Better, But Attack Surface Is Growing


Semiconductor Engineering sat down to discuss security on chips with Vic Kulkarni, vice president and chief strategist at Ansys; Jason Oberg, CTO and co-founder of Tortuga Logic; Pamela Norton, CEO and founder of Borsetta; Ron Perez, fellow and technical lead for security architecture at Intel; and Tim Whitfield, vice president of strategy at Arm. What follows are excerpts of that conversation,... » read more

Hardware Security: A Critical Piece Of The Cybersecurity Puzzle


Cybersecurity is a critical foundation of our rapidly expanding digital world spanning hardware and software that powers everything from our personal devices to the global infrastructure. Over the past decade, significant progress has been made in many security domains, especially in maturing secure software development processes. So far, hardware security has received limited attention, howeve... » read more

Reducing Hardware Security Risk


In today’s world, hackers, computer viruses and cyber-terrorists are making headlines almost daily. Security has become a priority in all aspects of life, and most importantly, of our businesses. Recently hackers have been targeting the heart of our most complex systems, the Application Specific ICs (ASICs) and Systems on Chips (SoCs) that run them. The risk associated with these devices i... » read more

What Makes A Chip Tamper-Proof?


The cyber world is the next major battlefield, and attackers are busily looking for ways to disrupt critical infrastructure. There is widespread proof this is happening. “Twenty-six percent of the U.S. power grid was found to be hosting Trojans," said Haydn Povey, IAR Systems' general manager of embedded security solutions. "In a cyber-warfare situation, that's the first thing that would b... » read more

Hardware Security For AI Accelerators


Dedicated accelerator hardware for artificial intelligence and machine learning (AI/ML) algorithms are increasingly prevalent in data centers and endpoint devices. These accelerators handle valuable data and models, and face a growing threat landscape putting AI/ML assets at risk. Using fundamental cryptographic security techniques performed by a hardware root of trust can safeguard these as... » read more

Battling Persistent Hacks At The Flash Level


Hardware vendors are beginning to close up security vulnerabilities across a broader range of technology than in the past, a sign that they are taking potential hardware breaches much more seriously. Awareness of security flaws has been growing since the introduction of Meltdown, Spectre and Foreshadow, and more recently, the Cable Haunt attack. The general conclusion among chipmakers is tha... » read more

Week in Review: Iot, Security, Automotive


IoT STMicroelectronics is now supporting LoRaWAN firmware updates over the air (FUOTA) in the STM32Cube ecosystem. Microsoft is adding ANSYS Twin Builder to its Microsoft Azure Digital Twins software, which companies use to create digital twins of machinery and IoT devices that are deployed in remotely. The digital replica of actual devices helps companies predict when maintenance is needed... » read more

A Glossary For Chip And Semiconductor IP Security And Trust


A significant portion of electronic system vulnerabilities involves hardware. In 2015 the Common Vulnerabilities and Exposures (CVE-MITRE) database recorded 6,488 vulnerabilities. A considerable proportion (43%) can be classified as software-assisted hardware vulnerabilities (see Fig. 1). The discovery of Meltdown and Spectre in January 2018 has sparked a series of investigations into hardware ... » read more

New Security Risks Create Need For Stealthy Chips


Semiconductors are becoming more vulnerable to attacks at each new process node due to thinner materials used to make these devices, as well as advances in equipment used to simulate how those chips behave. Thinner chips are now emitting light, electromagnetic radiation and various other types of noise, which can be observed using infrared and acoustic sensors. In addition, more powerful too... » read more

Security Tradeoffs In A Shifting Global Supply Chain


Experts at the Table: Semiconductor Engineering sat down to discuss a wide range of hardware security issues and possible solutions with Norman Chang, chief technologist for the Semiconductor Business Unit at ANSYS; Helena Handschuh, fellow at Rambus, and Mike Borza, principal security technologist at Synopsys. What follows are excerpts of that conversation. The first part of this discussion ca... » read more

← Older posts Newer posts →