Week In Review: Auto, Security, Pervasive Computing


NASA plans to launch the James Webb Space Telescope (JWST) this Saturday, Dec 25, on an European Space Agency (ESA) rocket. Mission-critical radiation-hardened components from IR HiRel, an Infineon company, will go up with the JWST. IR HiRel space-grade DC-DC converters, rad hard MOSFETs and other power control products are in the spacecraft bus subsystems, such as electrical power, altitude co... » read more

Why It’s So Difficult — And Costly — To Secure Chips


Rising concerns about the security of chips used in everything from cars to data centers are driving up the cost and complexity of electronic systems in a variety of ways, some obvious and others less so. Until very recently, semiconductor security was viewed more as a theoretical threat than a real one. Governments certainly worried about adversaries taking control of secure systems through... » read more

Considerations for Neuromorphic Supercomputing in Semiconducting and Superconducting Optoelectronic Hardware


Abstract: "Any large-scale spiking neuromorphic system striving for complexity at the level of the human brain and beyond will need to be co-optimized for communication and computation. Such reasoning leads to the proposal for optoelectronic neuromorphic platforms that leverage the complementary properties of optics and electronics. Starting from the conjecture that future large-scale neurom... » read more

Complex Chips Make Security More Difficult


Semiconductor supply chain management is becoming more complex with many more moving parts as chips become increasingly disaggregated, making it difficult to ensure where parts originated and whether they have been compromised before they are added into advanced chips or packages. In the past, supply chain concerns largely focused primarily on counterfeit parts or gray-market substitutions u... » read more

Power/Performance Bits: Oct. 26


Printing circuits on irregular shapes Researchers at Pennsylvania State University propose a way to print biodegradable circuits on irregular, complex shapes. “We are trying to enable direct fabrication of circuits on freeform, 3-D geometries,” said Huanyu “Larry” Cheng, professor in Penn State's Department of Engineering Science and Mechanics (ESM). “Printing on complicated objec... » read more

Progress On General-Purpose Quantum Computers


The race is on to scale up quantum computing, transforming it from an esoteric research tool into a commercially viable, general-purpose machine. Special-purpose quantum computers have been available for several years now. Systems like D-Wave’s Advantage focus on specific classes of problems that are amenable to modeling as quantum systems. Still, the ultimate goal of having a general purp... » read more

A quantitative model for the bipolar amplification effect: A new method to determine semiconductor/oxide interface state densities


Abstract "We report on a model for the bipolar amplification effect (BAE), which enables defect density measurements utilizing BAE in metal–oxide–semiconductor field-effect transistors. BAE is an electrically detected magnetic resonance (EDMR) technique, which has recently been utilized for defect identification because of the improved EDMR sensitivity and selectivity to interface defects.... » read more

Probe assisted localized doping of aluminum into silicon substrates


Abstract "This paper discusses the development of a rapid, large-scale integration of deterministic dopant placement technique for encoding information in physical structures at the nanoscale. The doped structures inherit identical and customizable radiofrequency (RF) electronic signature, which could be leveraged into an identification feature unique to the tag item. This will allow any manuf... » read more

Manufacturing Bits: Oct. 11


IC security using AFMs The National Institute of Standards and Technology (NIST) has developed a probe assisted doping technique (PAD), a technology that could help prevent counterfeit chips and electronic devices from entering the market. PAD involves creating a unique ID tag on every chip using an atomic force microscope (AFM). Basically, an AFM system incorporates a cantilever with a tin... » read more

Security Risks Grow With 5G


5G mobile phones can download a movie in seconds rather than minutes, but whether that can be done securely remains to be seen. What is clear from technology providers, though, is they are taking security very seriously with this new wireless technology. More data is in motion, and the value of that data is growing as users rely on mobile devices for everything from banking to automotive saf... » read more

← Older posts Newer posts →