Trust Assurance And Security Verification of Semiconductor IPs And ICs

Connected autonomous vehicles, 5G networks, Internet-of-things (IoT) devices, defense systems, and critical infrastructure use ASIC and FPGA SoCs running artificial intelligence algorithms or other complex software stacks. Vulnerable or tampered ICs can compromise the safety of people and the confidentiality, integrity, and availability of sensitive information. This paper analyzes the trust... » read more

How To Shorten Hardware-Software Development Cycles

Doing more hardware-software development prior to silicon promises significant productivity and time-to-market improvements. Part of this is shifting software development “to the left,” which can compress development Last month, I blogged about “The Great Shift to the Left,” and I pointed out some of the organizational challenges associated with compressing the development cycle usin... » read more