The Week In Review: Design


Tools Mentor Graphics unveiled a hypervisor with configuration, debugging and hardware support. The solution is aimed at a variety of vertical markets, ranging from industrial and medical to consumer electronics. NXP uncorked a passive Inter-Integrated Circuit (I²C) solution for near-field communications tagging, allowing appliances, wearables and consumer electronics to use existing NFC-... » read more

Supply Chain Corruption


The more the chip supply chain relies on third-party sources, the greater the risk for a design containing potential malicious code or functions. Today, complex and sophisticated ICs are ubiquitous in virtually every industry. They are being relied upon, as never before, to control critical infrastructure subsystems such as power, finance, communications, and transportation. In a recent r... » read more

The Simple Way To Steal Data


Given all the propaganda that is currently floating around about what the IoT/E, CoT is or isn’t, will or won’t be, one thing is for sure – it will be flooded with autonomous objects, most of which most will be cheap, simple, and, as it stands now, unsecured. And, given the equation that: a) side channel attacks are relatively easy, and b) that many of the chips of IoT/E, CoT objects a... » read more

Quantum Cryptography: A Magic Bullet For The IoT?


Quantum cryptography (QC for this discussion) theory—and it is still just theory—is potentially a very powerful security process that could be implemented for the dissemination of information over communications channels, using the principles of quantum mechanics. This is particularly intriguing because it is impossible to measure a photon, the fundamental element in the creation of QC secu... » read more

Malicious Code In The IoT


Fundamentally, malicious code families are initially comprised of one or more distinct malicious code samples. For clarity, malicious code is, globally used as an umbrella term for all types of malevolent program code. However, for this article, the term is being applied to static code and not morphing codes, which were discussed in a previous article. This discussion focuses on the type of mal... » read more

How Code Is Embedded


By Ambuj Kumar, System Architect at Rambus Cryptography Research Division Today, chip development and manufacturing processes have become exponentially complex. A typical chip may include dozens of semiconductor IPs, using various EDA tools, and developed around the globe,. The chip itself goes through very complex lifecycle from RTL through netlist, GDS data, wafer, and packaged die, to e... » read more

End-To-End Security


As the things we use every day get both connected and smarter, the sensitivity and potential damage caused by breaches in security becomes larger. With the new generation of connectedness, we saw a 368% rise in exposed identities last year over the year prior with 552 million leaked identities in 2013, according to the 2014 Internet Security Threat Report. Weak security is such an issue that... » read more

Blog Review: Sept. 3


Ansys’ Bill Vandermark flags the top five engineering technology articles of the week. A couple of these are unusual, such as e-mailing brain waves, and hoverbikes, which could really improve bike safety—as long as you don’t hit a bird. Synopsys’ Marc Greenberg looks at just how fast DDR4 can run. But what do you call it when you overclock everything? Is that still DDR4? Cadence�... » read more

The Week In Review: Design


Partnerships With an aim to drive adoption of software testing in Japan, Coverity, a Synopsys company said it has tapped OGIS-RI, a Japan-based distributor of IT solutions to partner with Coverity's software testing platform and OGIS-RI's open source license and vulnerability management tool. Maxscend Technologies has joined CEVA’s CEVAnet partner program and will offer complete solutio... » read more

Blog Review: Aug. 27


In the spirit of making a positive social contribution, and to recognize employees for their contributions to the local community, Applied Materials’ chairman Mike Splinter accepted the ALS Ice Bucket Challenge. Nice job, Mike! With development work underway on the 10nm process node, and questions about getting there with conventional lithography, Cadence’s Richard Goering invites us to ... » read more

← Older posts Newer posts →