中文 English

Beyond Bug Hunting: Verification Coverage From Safety To Certification


Understanding verification coverage is critical for meeting IC integrity standards and goes well beyond detecting bugs in the design. Without proper verification coverage metrics, meeting strict safety standards and certification may not be achievable. Precise metrics indicate where there are gaps in verification and provide a clear view of the progress being made in the verification effort. Co... » read more

Formally Verifying SystemC/C++ Designs


We’re seeing an increase in the number of designs employing SystemC/C++. This isn’t surprising given the fact that specific use models have emerged to drive common design flows across engineering teams leading to the adoption of high-level synthesis (HLS) at many large semiconductor and electronic systems companies. These HLS tools are a popular method to rapidly generate design components ... » read more

A Methodology To Verify Functionality, Security, And Trust for RISC-V Cores


Modern processor designs present some of the toughest hardware verification challenges. These challenges are especially acute for RISC-V processor core designs, with a wide range of variations and implementations available from a plethora of sources. This paper describes a verification methodology available to both RISC-V core providers and system-on-chip (SoC) teams integrating these cores. It... » read more

IoT Security: Confusing And Fragmented


Security regulations for Internet-of-Things (IoT) devices are evolving around the world, but there is no consistent set of requirements that can be applied globally — and there may never be. What exists today is a patchwork of certification labs and logos. That makes it difficult for IoT-device designers to know where to get their security blessed. Unlike in data centers, where there is a ... » read more

SoC Verification From Pre-Fabrication To The Over-the-Air Update


The recent new of attacks on system infrastructures serves to highlight that hardware vulnerabilities in the supply chain are not only possible but inevitable if proper precautions are ignored. Verification throughout the entire supply chain is necessary to ensure the safety and security of hardware. Starting as early as the pre-fabrication stage, vulnerabilities, if left unchecked, can be an o... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing — IoT, edge, cloud, data center, and back PC maker Dell Technologies is spinning off 81% equity ownership of VMWare to two standalone public companies. VMWare, founded in 1998, provides software to manage networking, apps, and cloud/data center. VMWare will pay a special dividend to its investing, which will generate $9.3 – $9.7 billion for Dell to use toward cutting it... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing — IoT, edge, cloud, data center, and back Arm announced its Armv9 architecture, which is designed for secure, pervasive computing that can run in more types of AI systems. Because most data will be touching an Arm-based chip in the near future — whether on the edge, IoT, or data center — Arm enhanced the security, in addition to improving performance and AI/ML capabil... » read more

Demand for IC Resilience Drives Methodology Changes


Applications that demand safety, security, and resilience are driving new ways of thinking about design, verification, and the long-term reliability of chips on a mass scale. The need is growing for chips that can process more data faster, over longer periods of time, and often within a shrinking power budget. That, in turn, is forcing changes at multiple levels, at the architecture, design,... » read more

An Automated Pre-Silicon IP Trustworthiness Assessment For Hardware Assurance


Paper presented by Sergio Marchese & John Hallman of OneSpin Solutions & The Aerospace Corporation. Integrated circuit designs include in-house and third-party intellectual properties that could contain hardware Trojans. An independent, trusted, and complete IP model, suitable for automated formal comparison with the IP register-transfer level (RTL) code using commercially available ... » read more

Top Tech Videos Of 2020


2020 shaped up to be a year of major upheaval, emerging markets and even increased demand in certain sectors. So it's not surprising that videos focusing on AI, balancing power and performance, designing and manufacturing at advanced nodes, advanced packaging, and automotive-related subjects were the most popular. Of the 68 videos published this year, the following were the most viewed in ea... » read more

← Older posts Newer posts →