Security Highlight: Compromising Printers Via Malicious Third-Party Cartridges


This fall, HP Inc. published an article describing a buffer overflow vulnerability in their printer software which would allow an attacker to obtain persistent remote code execution on the printer. Buffer overflow vulnerabilities are common, but what makes this one noteworthy is that it can be exploited remotely by a malicious third-party printer cartridge. In the printer ecosystem, there ... » read more

RISC-V Pushes Into The Mainstream


RISC-V cores are beginning to show up in heterogeneous SoCs and packages, shifting from one-off standalone designs toward mainstream applications where they are used for everything from accelerators and extra processing cores to security applications. These changes are subtle but significant. They point to a growing acceptance that chips or chiplets based on an open-source instruction set ar... » read more

Blog Review: Dec. 14


Siemens EDA's Harry Foster checks out design and verification language adoption trends in FPGA projects, including testbench methodologies and assertion languages. Cadence's Veena Parthan finds that giving electric vehicle batteries a second life as energy storage devices can extend their useful life by 5 to 8 years, but a lack of standardization in EV batteries poses challenges. Synopsys... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive, Mobility The U.S. space agency NASA entered a $57.2 million contract with ICON to develop technology to build roads on the moon. ICON, a Texas-based 3D printing construction company, has been working with NASA and the U.S. Air Force on construction technologies that can use local materials to build infrastructure on Mars. NASA is working on advanced 3D printing construction systems... » read more

Cybersecurity Risks Of Automotive OTA


Modern vehicles increasingly resemble supercomputers on wheels, with many electronic control units (ECUs) networked together as increasingly sophisticated software is installed and updated. Similar to smartphones, vehicle OEMs will contact vehicle owners remotely about operating system updates that add new features and/or fixes, as well as software bugs and vulnerabilities. But all of this h... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive, mobility Infineon has a non-binding Memorandum of Understanding to supply automaker Stellantis with CoolSiC “bare die” chips by reserving manufacturing capacity in the second half of the decade to the direct Tier 1 suppliers of Stellantis. CoolSiCs are Infineon’s silicon carbide (SiC) semiconductors. Stellantis will acquire aiMotive, a startup specializing in AI and autono... » read more

Improving Reliability In Automobiles


Carmakers are turning to predictive and preventive maintenance to improve the safety and reliability of increasingly electrified vehicles, setting the stage for more internal and external sensors, and more intelligence to interpret and react to the data generated by those sensors. The number of chips inside of vehicles has been steadily rising, regardless of whether they are powered by elect... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive And Mobility Two major auto OEMs revealed new electric vehicle models this week. The Audi Q8 e-tron has 40 driver assistance systems including five radar sensors, five cameras, and 12 ultrasonic sensors, and comes with either an 89 net kilowatt-hour battery or a 106 net kilowatt-hour battery. It arrives in the U.S. in April 2023. The Volvo EX90 contains both lidar and 5G connectivit... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive, mobility Saudi Arabia has launched an electric vehicle (EV) company called Ceer. The company is a joint venture between the Public Investment Fund (PIF) of Saudia Arabia and Foxconn (Hon Hai Precision Industry Co.). SiMa.ai, a four-year-old startup that designs edge machine learning SoCs used in vision applications, is getting into the automotive assisted driving market. The com... » read more

Memory-Based Cyberattacks Become More Complex, Difficult To Detect


Memories are becoming entry points for cyber attacks, raising concerns about system-level security because memories are nearly ubiquitous in electronics and breaches are difficult to detect. There is no end in sight with hackers taking aim at almost every consumer, industrial, and commercial segment, and a growing number of those devices connected to the internet and to each other. According... » read more

← Older posts Newer posts →