IC Security Threat Grows As More Devices Are Connected


Designing for security is beginning to gain traction across a wider swath of chips and systems as more of them are connected to the Internet and to each other, sometimes in safety- and mission-critical markets where the impact of a cyber attack can be devastating. But it's also becoming more difficult to design security into these systems. Unlike in the past, connectivity is now considered e... » read more

The Case For FPGA Equivalence Checking


Formal Equivalence Checking (EC) has become a standard part of the ASIC development flow, replacing almost all gate level simulation with a rigorous consistency check between pre- and post-synthesized code. In the Field Programmable Gate Array (FPGA) space, EC is still a relatively new concept, but is rapidly becoming important given the large devices being employed today. For the largest FP... » read more

Security Concerns Rise For Connected Autos


The auto industry is transforming itself toward a future in which the automobile increasingly will be connected using V2X and 5G. Driver assistance will improve, and ultimately cars will be guided by AI and machine learning. But all of this will be closely watched by hackers, looking for an opening and a potentially large and untraceable payout. The replacement of mechanical functionality wi... » read more

Putting Limits On What AI Systems Can Do


New techniques and approaches are starting to be applied to AI and machine learning to ensure they function within acceptable parameters, only doing what they're supposed to do. Getting AI/ML/DL systems to work has been one of the biggest leaps in technology in recent years, but understanding how to control and optimize them as they adapt isn't nearly as far along. These systems are generall... » read more

Merging Verification And Test


While the disciplines of functional verification and test serve different purposes, their histories were once closely intertwined. Recent safety and security monitoring requirements coupled with capabilities being embedded into devices is bringing them closer together again, but can they successfully cooperate to bring about improvements in both? Getting there may be difficult. Three phases ... » read more

Week In Review: Design, Low Power


Siemens Digital Industries Software will acquire OneSpin Solutions, a provider of formal verification tools. The company's portfolio of formal tools and apps covers a wide range of design verification, equivalence checking, and functional safety, as well as solutions for trust and security checking. Siemens plants to add OneSpin's technology to the Xcelerator portfolio of verification tools. ... » read more

Guiding Principles To Ensure Your Hardware Is Secure


The modern society relies on complex, intelligent electronic systems. Automotive, avionics, medical, smartphones, communication and 5G networks, critical infrastructure, data centers, and other applications are ever more dependent on integrated circuits (ICs) that deliver high performance, low power consumption, safety, cybersecurity, and continuity of operation. Hardware is so central to compe... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing — IoT, edge, cloud, data center, and back Arm announced its Armv9 architecture, which is designed for secure, pervasive computing that can run in more types of AI systems. Because most data will be touching an Arm-based chip in the near future — whether on the edge, IoT, or data center — Arm enhanced the security, in addition to improving performance and AI/ML capabil... » read more

Privacy Protection A Must For Driver Monitoring


Driver monitoring systems are so tied into a vehicle's architecture that soon the driver will not be able to opt out because the vehicle will only operate if the driver is detected and monitored. This is raising privacy concerns about whether enough security is in place for the data to remain private. At the very least, laws and regulations in every geography where the vehicle will operate a... » read more

Unlock Your Vision… And A Bit Of EDA History


Repetitive patterns and hardware designs have something in common: there may be more than meets the eye. Even simple designs can have corner cases that are hard to detect by code review alone, and the situation is even more complex if third-party or legacy IP is involved. What if the IP has a deliberately hidden function? This is where verification tools like OneSpin 360 come in, to remove huma... » read more

← Older posts Newer posts →