Imperfect Silicon, Near-Perfect Security


Some chipmakers, under pressure to add security to rapidly growing numbers of IoT devices, have rediscovered a "fingerprinting" technique used primarily as an anti-counterfeiting measure. [getkc id="227" kc_name="Physically unclonable functions"] (PUFs) are used to assign a unique identification number based on inconsistencies in the speed with which current causes a series of logic gates to... » read more

IoT Security Ratings Needed


Concerns about security have been growing alongside adoption of the IoT, and it seems to be making some headway. This is good news, if it continues, because one of the biggest concerns about buying connected devices is that they can provide inroads into personal data. Data security has been a persistent annoyance for several years. Almost anyone who travels or shops at major department store... » read more

The Week in Review: IoT


Technology The Internet of Things got some attention at this week’s Intel Developer Forum in San Francisco. Intel CEO Brian Krzanich introduced the Joule compute module in his opening-day keynote address. The module is a high-performance developer platform supporting Intel RealSense depth-sensing cameras. Canonical, Microsoft, and PivotHead were among the IDF exhibitors demonstrating the Jou... » read more

Grappling With Auto Security


It’s a changed world under the hood of automobiles today, as vehicles become increasingly connected to infrastructure and each other. But that connectedness also is creating new security risks. Growing complexity is one piece of the problem. There are upwards of 80 electronic control units (ECUs) and more than 100 million lines of code in an average vehicle. On top of that, there are m... » read more

The Week in Review: IoT


Deals Samsung said Tuesday that it will invest about $1.2 billion in Internet of Things startups in the U.S. over the next four years. Investments will be made through the Samsung Global Innovation Center in Silicon Valley and through other Samsung units. Samsung is partnering with Intel to establish the National IoT Strategy Initiative, which will take in academic and industry members and wil... » read more

The Week In Review: Design


Tools Synopsys uncorked the latest version of its software for the design of optical communication systems and photonic integrated circuits at the signal propagation level, adding a new interface and expanding the software's application design libraries. Mentor Graphics said it would provide a variety of tools to support the new Zynq UltraScale+ MPSoC devices from Xilinx, dual-core field-... » read more

The Week In Review: Design


Tools Mentor Graphics uncorked the latest version of its Catapult high-level synthesis platform, adding a formal-based C Property Checker tool to automatically identify and formally prove hard-to-find issues like uninitialized memory, divide by 0, and array bounds errors in the users' HLS C++/SystemC model. IP ARM unveiled the Cortex-A73 and Mali-G71 processors. According to ARM, the g... » read more

IC Industry Waking Up To Security


By Jeff Dorsch & Ed Sperling Many people pay lip service to the concept of security in Internet of Things devices, software, and networks. That oversight is beginning to fade away, however, as companies begin digging into one of the broadest and most complex problems in the IoT age. Unlike other technology issues, which have been solved in increments, security is all-inclusive. While ... » read more

The Week In Review: Design/IoT


Know someone who deserves the Phil Kaufman Award for Distinguished Contributions to EDA? Nominations are open until June 30th. Tools, IP & Chips ARM debuted the Cortex-R8 processor, targeting mass storage devices and future 5G modems with a quad-core configuration and extended low-latency memory. Cadence's schematic design tool, OrCAD Capture, added the capability to export hierarc... » read more

Next Bonanza: Security Holes


Security threats—both real and potential—are beginning to reshape the semiconductor business. These threats are drawing venture capitalists back into the industry as they race for the next big opportunity. They are blurring the lines between software and hardware, as threats grow in complexity at every level of a device and its myriad and sometimes perpetual connections to the outside wo... » read more

Newer posts →