Using Formal For RISC-V Security


Finding and closing up security holes is becoming more important as chips are used in safety- and mission-critical applications, but it's increasingly important for chips designed for much less costly devices, where the selling price typically doesn't warrant a significant investment in security. The problem is these devices are connected to some of the same networks, and any access points for ... » read more

AI Drives IC Design Shifts At The Edge


The increasing adoption of AI in edge devices, coupled with a growing demand for new features, is forcing chipmakers to rethink when and where data gets processed, what kind of processors to use, and how to build enough flexibility into systems to span multiple markets. Unlike in the cloud, where the solution generally involves nearly unlimited resources, computing at the edge has sharp cons... » read more

Green ICT: The IoT World Also Needs Ecological Awareness


By Volkhard Beyer and Dirk Mayer Microelectronics support the fight against climate change and for a better environment; for example, by intelligently controlling drive units, ensuring optimal operation of energy systems, and monitoring the resource requirements of production processes. Unfortunately, however, the ICT sector itself is one of the fastest-growing emitters of greenhouse gase... » read more

Edge Devices Require New Security Approaches


The diversity of connected devices and chips at the edge — the vaguely defined middle ground between the end point and the cloud — is significantly widening the potential attack surface and creating more opportunities for cyberattacks. The edge build-out has been underway for at least the past half-decade, largely driven by an explosion in data and increasing demands to process that data... » read more

Post-Quantum Computing Threatens Fundamental Transport Protocols


The Transport Level Security (TLS) protocol is one of the few rock-steady spots in the rapidly changing computing industry, but that's about to change as quantum computers threaten traditional encryption schemes. Because TLS is fundamental to network communications, including allowing Internet of Things (IoT) devices to function properly, researchers already are exploring both hardware and s... » read more

Simplifying AI Deployment from the Cloud to Edge and Endpoint


Artificial Intelligence (AI) is transforming every aspect of life. It is enhancing quality in industrial applications, enabling smart home systems, monitoring our safety as we work and play. Advances in technology have allowed us to run complex machine learning algorithms to tackle unique problems allowing those to be implemented also on embedded devices used in our daily life in home and indus... » read more

6G And Beyond: Overall Vision And Survey of Research


A new 92 page technical paper titled "6G: The Intelligent Network of Everything -- A Comprehensive Vision, Survey, and Tutorial" was published by IEEE researchers at Finland's University of Oulu. Abstract "The global 6G vision has taken its shape after years of international research and development efforts. This work culminated in ITU-R's Recommendation on "IMT-2030 Framework". While the d... » read more

Securing The World’s Data: A Looming Challenge


A combination of increasingly complex designs, more connected devices, and a mix of different generations of security technology are creating a whole new set of concerns about the safety of data nearly everywhere. While security experts have been warning of a growing threat in electronics for decades, there have been several recent fundamental changes that elevate the risk. Among them: ... » read more

MIPI In Next Generation Of AI IoT Devices At The Edge


The history of data processing begins in the 1960s with centralized on-site mainframes that later evolved into distributed client servers. In the beginning of this century, centralized cloud computing became attractive and began to gain momentum, becoming one of the most popular computing tools today. In recent years however, we have seen an increase in the demand for processing at the edge or ... » read more

Suppressing Power Side-Channel Attacks: A HW/SW Design For Resource-Constrained IoT Devices


A technical paper titled “Hardware/Software Cooperative Design Against Power Side-Channel Attacks on IoT Devices” was published by researchers at Tokyo Institute of Technology and the University of Electro-Communications. Abstract: "With the growth of Internet of Things (IoT) era, the protection of secret information on IoT devices is becoming increasingly important. For IoT devices, atta... » read more

← Older posts