中文 English

Week In Review: Auto, Security, Pervasive Computing


Automotive, mobility Stellantis is buying Share Now, a car sharing service owned by BMW and Mercedes-Benz. Through the acquisition, Stellantis will be adding 3.4 million car sharing customers, 10,000 vehicles, and 14 new European cities to its Free2move car sharing service, which currently has 2 million users, 2,500 vehicles, and has 7 “mobility hubs” in the U.S. and Europe. ShareNow was a... » read more

Complex Chips Make Security More Difficult


Semiconductor supply chain management is becoming more complex with many more moving parts as chips become increasingly disaggregated, making it difficult to ensure where parts originated and whether they have been compromised before they are added into advanced chips or packages. In the past, supply chain concerns largely focused primarily on counterfeit parts or gray-market substitutions u... » read more

Why It’s So Difficult — And Costly — To Secure Chips


Rising concerns about the security of chips used in everything from cars to data centers are driving up the cost and complexity of electronic systems in a variety of ways, some obvious and others less so. Until very recently, semiconductor security was viewed more as a theoretical threat than a real one. Governments certainly worried about adversaries taking control of secure systems through... » read more

Complex Chips Make Security More Difficult


Semiconductor supply chain management is becoming more complex with many more moving parts as chips become increasingly disaggregated, making it difficult to ensure where parts originated and whether they have been compromised before they are added into advanced chips or packages. In the past, supply chain concerns largely focused primarily on counterfeit parts or gray-market substitutions u... » read more

High-Level Synthesis For RISC-V


High-quality RISC-V implementations are becoming more numerous, but it is the extensibility of the architecture that is driving a lot of design activity. The challenge is designing and implementing custom processors without having to re-implement them every time at the register transfer level (RTL). There are two types of high-level synthesis (HLS) that need to be considered. The first is ge... » read more

Hierarchical Verification for EC-FPGA Flow


This document describes the methodology to apply EC-FPGA verification using hierarchical netlists. This approach is recommended in case the verification of the overall design has issues with convergence. The document contains a step-by-step description of different methods while providing reasoning for the soundness of each approach. It is assumed for this document that the reader is familiar w... » read more

Deep Dive Into Hardware Security Verification At This Year’s Osmosis User Group


We’ve been talking for months about how to successfully verify designs to avoid security weaknesses and vulnerabilities. In the upcoming Osmosis (OneSpin Meeting on Solution, Innovation & Strategy) user group event, attendees will get to hear first-hand from one of our most ardent users how they were able to secure their hardware design. The two-day, virtual event on November 3rd and 4... » read more

The Early Bird Gets More Secure Hardware


I’m sure you’ve heard the expression “The early bird gets the worm.” This proverb emphasizes the importance of starting something early to maximize the potential outcome. In terms of hardware security, this idiom is spot on. Cybersecurity shouldn’t only be about protecting the software from attacks. Hardware is just as important. Cyberattacks continue to advance significantly, prog... » read more

Week In Review: Design, Low Power


Tools Cadence teamed up with Tower Semiconductor to release a silicon-validated SP4T RF SOI switch reference design flow using the Cadence Virtuoso Design Platform and RF Solution. The reference design flow targets advanced 5G wireless, wireline infrastructure, and automotive IC product development and include a set of mixed-signal and RF design, simulation, system analysis and signoff tools t... » read more

Does Your IC Security Need A Renovation?


Five years ago, I moved from Silicon Valley to Gig Harbor, Washington and bought a fixer-upper. As part of my ongoing (and extensive) home renovations, I just finished having the entire exterior redone: roof, siding, paint, masonry, front porch, back deck, outdoor lighting, the works. If you’ve ever embarked on any kind of home remodel project, I don’t have to tell you that the process incl... » read more

← Older posts