中文 English

Security Provisioning Moves Out Of The Factory


Security credentials traditionally have been provisioned during chip manufacturing, often as a final part of the testing process. That's starting to change. Logistics management can be improved by pushing that process out — even as far as the on-boarding process. And simpler on-boarding can hide most of the details from the user. “The IT approach to provisioning IoT devices has primar... » read more

New And Innovative Supply Chain Threats Emerging


The electronics supply chain is seeing evidence of increased sophistication in the counterfeiting of complex ICs and simple passives, both of which can impact the functioning and safety of the systems that use them. New technologies are being developed to build trust by helping to identify counterfeit devices before assembly and during failure analysis. It's too early to tell how effective t... » read more

All-in-One Vs. Point Tools For Security


Security remains an urgent concern for builders of any system that might tempt attackers, but designers find themselves faced with a bewildering array of security options. Some of those are point solutions for specific pieces of the security puzzle. Others bill themselves as all-in-one, where the whole puzzle filled in. Which approach is best depends on the resources you have available and y... » read more

How Physically Unclonable Function (PUF) Technology Protects Embedded Systems


Security experts have been excited about the promise of physically unclonable function (PUF) technology for many years. It wasn't until recently, however, that reliable, cost-effective ICs with integrated PUF technology became available on the market. What's driving all of the excitement over PUF? In this white paper, I'll demystify PUF and highlight how it benefits a variety of embedded system... » read more

Trustworthy Electronics


Global supplier networks are a key feature of the development of integrated electronic components today. Even in times of ever more complex trade relationships, supply chains must still function effectively. At the same time, it is necessary to achieve the technological advances required for the development of new products and maintain technological sovereignty. In view of the increasing dig... » read more

Making Sense Of PUFs


As security becomes a principal design consideration, physically unclonable functions (PUFs) are seeing renewed interest as new players emerge onto the market. PUFs can play a central role in hardware roots of trust (HRoTs), but the messaging in the market can make it confusing to understand the different types of PUF as well as their pros and cons. PUFs leverage some uncertain aspect of som... » read more

Security’s Very Strange Path To Success


Security at the chip level appears to be heading toward a more promising future. The reason is simple—more people are willing to pay for security than in the past. For the most part, security is like insurance. You don't know it's working until something goes wrong, and you don't necessarily even know right away if there has been a breach. Sometimes it takes years to show up, because it ca... » read more

Are Devices Getting More Secure?


Adding security into chip design is becoming more prevalent as more devices are connected to the Internet, but it's not clear whether that is enough to offset an explosion in connected "things." Security concerns have been growing for the past half-decade, starting with a rash of high-profile attacks on retail establishments, hotel membership clubs, and Equifax, one of the three top credit-c... » read more

Complexity, Reliability And Cost


Peter Schneider, director of Fraunhofer's Engineering of Adaptive Systems Division, sat down with Semiconductor Engineering to talk about future challenges in complexity, time to market and reliability issues, advanced packaging architectures, and the impact of billions of connected devices. What follows are excerpts of that discussion. SE: What is the biggest challenge you see in the semico... » read more

Physically Unclonable Functions


Physically unclonable functions (PUFs) are emerging as a novel way to protect a variety of ICs. In today’s world of cyber threats, vulnerabilities, insecure networks and hardware, and intrusions, it is finding a renewed interest. The technology on which it is based has been around since the mid-1990s in its present form and the term PUF was cloned in the early 2000s. PUFs find their anc... » read more