Quantum Plus AI Widens Cyberattack Threat Concerns


Quantum computing promises revolutionary changes to the computing paradigm that the semiconductor industry has operated under for decades, but it also raises the prospect of widespread cybersecurity threats. Quantum computing cyberattacks will occur millions of times faster than any assault conventional computing can muster. And while quantum computing is in an early stage of development, ex... » read more

IC Security Threat Grows As More Devices Are Connected


Designing for security is beginning to gain traction across a wider swath of chips and systems as more of them are connected to the Internet and to each other, sometimes in safety- and mission-critical markets where the impact of a cyber attack can be devastating. But it's also becoming more difficult to design security into these systems. Unlike in the past, connectivity is now considered e... » read more

Managing Device Certificates Is Becoming Harder


As the number of devices connected to the Internet balloons, certificate management is becoming more complex, more essential, and significantly harder to keep track of. There are many different certificates for many different purposes, not to mention certificates that are unique to each device. And the lifetimes of those certificates may vary, making it even tougher to keep operating certifi... » read more

Making Sense Of PUFs


As security becomes a principal design consideration, physically unclonable functions (PUFs) are seeing renewed interest as new players emerge onto the market. PUFs can play a central role in hardware roots of trust (HRoTs), but the messaging in the market can make it confusing to understand the different types of PUF as well as their pros and cons. PUFs leverage some uncertain aspect of som... » read more

Security For Embedded Electronics


The embedded systems market is expected to enjoy steady growth in the near future—provided those systems can be adequately secured. One of the biggest challenges for embedded devices and systems, especially those employed in the [getkc id="76" comment="Internet of Things"], is adequately protecting them from increasingly sophisticated hacking. This is a new tool for criminal enterprises, a... » read more

The Week In Review: IoT


Conferences It’s been an action-packed week at Internet of Things World. The show was co-located at the Santa Clara Convention Center with the Connected & Autonomous Vehicles conference. There were lots of deals announced and many products or services debuted at IoT World, which has grown enormously in four years, from 700 attendees at its first event in Palo Alto, Calif., in 2014 to some 14... » read more

Unexpected Security Holes


Security is emerging as one of the top challenges in semiconductor design across a variety of markets, with the number of security holes growing by orders of magnitude in sectors that have never dealt with these kinds of design constraints before. While security has been a topic of conversation for years in mobile phones and data centers, commercial and industrial equipment is being connecte... » read more

Securing The Cloud


Cloud computing offers on-demand network access that is ubiquitous and convenient, with a pool of configurable computing resources such as shared networks, servers, storage, applications, and services. What makes this so attractive is these services can be provisioned and adapted to the load, with minimal management or service provider intervention. Cloud computing takes advantage of a distr... » read more

When Cryptographers Disagree


Six of the world's leading cryptography experts sat down this week to explore the most pressing issues in security. They took up topics ranging from whether Apple should facilitate the FBI's access to a known terrorist's iPhone, to what will become the next important cryptography algorithm. Among them: Ronald Rivest, an Institute Professor at MIT; Adi Shamir, co-inventor of the RSA algorithm... » read more