Week In Review: Auto, Security, Pervasive Computing


Automotive, Mobility Hyundai announced all of its vehicles will be software-defined vehicles (SDVs) by 2025. The company said all newly launched Hyundai vehicles will be able to receive over-the-air software updates next year, and that it expects to register 20 million vehicles to its Connected Car Services system by 2025. Hyundai also said it will invest the equivalent of more than $12 billio... » read more

Automating The Detection of Hardware Common Weakness Enumerations In Early Design


A new technical paper titled "Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design" was published by researchers at NYU, Intel, Duke and University of Calgary. "To help prevent hardware security vulnerabilities from propagating to later design stages where fixes are costly, it is crucial to identify security concerns as early as possible, such as in RTL designs. ... » read more

Is Standardization Required For Security?


Semiconductor Engineering sat down to discuss chip and system security with Mike Borza, fellow and scientist on the security IP team at Synopsys; Lee Harrison, automotive IC test solutions manager at Siemens Digital Industries Software; Jason Oberg, founder and CTO of Cycuity (formerly Tortuga Logic); Nicole Fern, senior security analyst at Riscure; Norman Chang, fellow and CTO of the electroni... » read more

Week In Review: Manufacturing, Test


Deals AMD plans to purchase cloud startup Pensando for about US $1.9 billion. In a presentation at the SEMI ISS conference this week, AMD CTO Mark Papermaster described Pensando's technology as a "highly programmable packet-processing engine that allows you to speed up systems designed for the data center." Intel, Micron, Analog Devices and MITRE Engenuity formed an alliance to accelerate c... » read more

Hardware Security Optimization With MITRE CWE


Whether you’re just starting to build out a hardware security program at your organization, or you’re looking to optimize existing hardware security processes, the MITRE Common Weakness Enumeration (CWE) database is an excellent resource to keep in your toolbox. What is CWE? A CWE is a type of vulnerability, or flaw, in the design of either hardware or software in embedded systems. Indi... » read more

Why It’s So Difficult — And Costly — To Secure Chips


Rising concerns about the security of chips used in everything from cars to data centers are driving up the cost and complexity of electronic systems in a variety of ways, some obvious and others less so. Until very recently, semiconductor security was viewed more as a theoretical threat than a real one. Governments certainly worried about adversaries taking control of secure systems through... » read more

Week In Review: Manufacturing, Test


Chipmakers AMD has rolled out its new MI200 series products, the first exascale-class GPU accelerators. Using a fan-out bridge packaging technology, the MI200 series are designed for high-performance computing (HPC) and artificial intelligence (AI) applications. The MI200 series accelerators feature a multi-die GPU architecture with 128GB of HBM2e memory. Typically, the HBM2e memory stack a... » read more

Radix Coverage For Hardware Common Weakness Enumeration (CWE) Guide


MITRE's hardware Common Weakness Enumeration (CWE) database aggregates hardware weaknesses that are the root causes of vulnerabilities in deployed parts. A complete list can be found on the MITRE Hardware Design Webpage. Hardware CWEs are ideal to be used alongside internally developed security requirements databases and have been developed and submitted by both government and commercial design... » read more

Fundamental Changes In Economics Of Chip Security


Protecting chips from cyberattacks is becoming more difficult, more expensive and much more resource-intensive, but it also is becoming increasingly necessary as some of those chips end up in mission-critical servers and in safety-critical applications such as automotive. Security has been on the semiconductor industry's radar for at least the past several years, despite spotty progress and ... » read more

Do You Trust Your IP Supplier?


How much do you trust your IP supplier, regardless of whether IP was developed in-house or by a third-party provider? And what implications does it have a system integrator? These are important questions that many companies are beginning to ask. Today, there are few methods, other than documentation, that provide the necessary information. The software industry may be ahead of the hardware i... » read more

← Older posts Newer posts →