Post-Quantum And Pre-Quantum Security Issues Grow


General-purpose quantum computers will be able to crack the codes that protect much of the world’s information, and while these machines don’t exist yet, security experts say governments and businesses are starting to prepare for encryption in a post-quantum world. The task is made all the more challenging because no one knows exactly how future quantum machines will work, or even which mat... » read more

Glitched On Earth By Humans


The Black Hat conference always brings up interesting and current research within the device security industry. Lennert Wouters of COSIC studied the security of the Starlink User Terminal. After some PCB-level reverse engineering, he found a serial port and observed various boot loaders, U-boot, and Linux running on the device. However, there was no obvious way to gain further access. The... » read more

Blog Review: Oct. 26


Synopsys' Teng-Kiat Lee and Sandeep Mehndiratta argue that IC design in the cloud can support an existing on-prem strategy, enable large and small enterprises to manage cost and capacity more effectively, and offer security for valuable semiconductor IP. Siemens EDA's Chris Spear finds that SystemVerilog classes are a good way to encapsulate both variables and the routines that operates on t... » read more

Blog Review: Oct. 19


Siemens EDA's Harry Foster examines trends related to various aspects of FPGA design and the growing design complexity associated with increasing number of embedded processor cores, asynchronous clock domains, and more safety features. Synopsys' Twan Korthorst and Kenneth Larsen take a broad look at silicon photonics, including the benefits of electronic integration, accelerating the develop... » read more

DRM Security Trends And Future


Digital rights management (DRM) is known to protect and encrypt content in order to deliver it to the device. DRM’s main purpose is to close the gaps in content protection strategies and enable content consumption on different devices to be easily accessible. As DRM technologies have matured, it is expected that their security capabilities will follow. The security measures implemented on ... » read more

Testing Chips For Security


Supply chains and manufacturing processes are becoming increasingly diverse, making it much harder to validate the security in complex chips. To make matters worse, it can be challenging to justify the time and expense to do so, and there’s little agreement on the ideal metrics and processes involved. Still, this is particularly important as chip architectures evolve from a single chip dev... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive, mobility Siemens Digital Industries Software and climate-tech company sustamize devised a way to add carbon emissions data to Siemens Xcelerator. Siemens created its Teamcenter Carbon Footprint Calculator software to help teams measure, simulate, reduce, and track their product carbon footprint early in the development phase. The calculator uses sustamize’s Product Footprint Engi... » read more

Blog Review: Sept. 14


Synopsys' Godwin Maben, Piyush Sancheti, and Hany Elhak examine some of the top chip design considerations for medical devices and why they require careful analysis of power to reduce the number surgeries to replace batteries, reliability for devices that can be expected to last for ten years or more, and security to protect private medical data and prevent breaches. Siemens' Chris Spear exp... » read more

Week In Review: Auto, Security, Pervasive Computing


The great EV ramp EV-related developments are everywhere. California’s move to ban sales of new internal-combustion vehicles by 2035, and the U.S. government’s sweeping embrace of clean-energy, are in lockstep with recent moves by the auto industry and related supply chains, as well as cutting-edge research. One of the big breakthroughs is the ability to charge an EV in 10 minutes witho... » read more

Security Highlight: Honda Rolling-PWN Attack


The attack known as Rolling-PWN (CVE-2021-46145) [1] is the latest of a recent series of security issues affecting the car’s immobilizers and RKEs (Remote Keyless Entry, also known as the keyfob or remote control). Over the past years, we have seen how security researchers identified attacks that could open and even start cars from vendors like Tesla [2], Hyundai-Kia [3], VAG (Volkswagen, ... » read more

← Older posts Newer posts →