What Does Cybersecurity Have To Do With Semiconductors?


More than ever, electronic devices are critical to everyday life and semiconductor chips are the brains inside the devices that run the world. They wake us in the morning, keep us up to date with the news, emails and conversations, handle our daily chores, and even keep us alive in the hospitals. For example, laptops, smartphones, the Internet, the banks, automobile controls and an endless list... » read more

Dodging The Next Generation Of Car Thieves


The complexity of vehicle electronics is growing and brings with it more opportunities for hackers to penetrate the car’s defenses. More connections bring in multiple network topologies, which may or may not be secure. As they are all intertwined and interconnected, any connection to get into the vehicle’s electronics is a potential point of attack for hackers. For example, jamming RFID sig... » read more

Establishing the Root of Trust for the Internet of Things


The Internet of Things (IoT) is a quickly emerging ecosystem of applications, products and services in which both large and small devices connect to the internet. These new IoT devices will be embedded into diverse applications ranging from home security and home automation to manufacturing—and more. Protecting the data collected from these dispersed IoT endpoints presents a myriad of challen... » read more

Is Your AI SoC Secure?


As artificial intelligence (AI) enters every application, from IoT to automotive, it is bringing new waves of innovation and business models, along with the need for high-grade security. Hackers try to exploit vulnerabilities at all levels of the system, from the system-on-chip (SoC) up. Therefore, security needs to be integral in the AI process. The protection of AI systems, their data, and th... » read more

Tech Talk: HW Security


Ben Levine, senior director of product management at Rambus, explains how to minimize the risk of attacks on chip hardware, why design for security is becoming more critical for connected devices, and strategies for making devices less vulnerable. https://youtu.be/twgHcdqvyjU » read more

The CryptoManager Root Of Trust


In January 2018, Meltdown and Spectre were independently disclosed by multiple security researchers, including senior Rambus technology advisor Paul Kocher and senior Rambus security engineer Mike Hamburg. The two security flaws exploit critical vulnerabilities across a wide range of modern processors, including Intel, ARM and AMD. Notably, however, existing RISC-V processors remain unaffected ... » read more

Who’s Responsible For Security?


Semiconductor Engineering sat down to discuss security issues and how to fix them with Mark Schaeffer, senior product marketing manager for secure solutions at Renesas Electronics; Haydn Povey, CTO of Secure Thingz; Marc Canel, vice president of security systems and technologies at [getentity id="22186" comment="Arm"]; Richard Hayton, CTO of Trustonic; Anders Holmberg, director of corporate dev... » read more

IIoT Security Threat Rising


The rapid growth of the Industrial Internet of Things is raising questions about just how secure these systems are today, how to improve security, and who exactly should be responsible for that. These issues are interlaced with a shift in where a growing volume of data gets processed, the cost and speed of moving large amounts of data, and the increasing frequency and cost of attacks. "Di... » read more

Protecting Automotive Systems With A Root Of Trust


As our cars become more connected and autonomous, we depend on them to entertain us, connect seamlessly to our phones (which carry substantial personal information), help keep us in our proper driving lane, and more. We expect that the electronics in the automobile will work as advertised. However, connected cars can have vulnerabilities to direct, over-the-air, or side-channel attacks, which c... » read more

IoT Security: Technology Is Only One Part Of The Equation


Survey after survey on the adoption of the IoT punctuates that security and data privacy continue to be the top concerns with any new implementation. It used to be that security was all about protecting data (business, personal ID, etc.), but as more devices are connected to the IoT, security concerns reach far beyond just the value inherent in the data. According to Gartner, nearly 5.5 ... » read more

← Older posts