Designing Automotive ICs For Cybersecurity


The day has already arrived when we need to be concerned about the cybersecurity of our cars. An average modern car includes about 1400 ICs and many of them are used in sophisticated applications, like autonomous driving and vehicle-to-everything (V2X) communication. The security of road vehicles is an important issue to automakers and OEMs but is rooted in the IC devices that power the vehicle... » read more

RT-600 Root Of Trust Series: A New Generation of Security Anchored In Hardware


This latest generation of the Rambus RT-600 Root of Trust IP offers many new features designed to support the security needs of customers today and into the future. These features include Quantum Safe Cryptography, Caliptra Root of Trust for Measurement (RoTM) emulation, an embedded physical unclonable function (PUF), as well as many architectural improvements, such as larger memory space and 6... » read more

Silicon Root Of Trust IP And The Automotive Chain Of Trust


Cybersecurity attacks in the automotive industry have increased in magnitude, frequency and sophistication in recent years. According to IDC, there have been more than 900 publicly reported automotive security incidents since 2010, and this number is growing year over year. New attack vectors are emerging all the time. For example, attacks on the EV charging infrastructure reached 4% of total i... » read more

Automotive Security: Meeting The Growing Challenges With Certified Hardware Security Module IP


Automotive systems, and the semiconductors used within them, are some of the most complex electronics seen today. The radical transformation from an isolated mechanical car to a connected software-driven car is driving the increased use of semiconductors in vehicles: these include advanced driver assistance systems (ADAS), electrification, and enhanced driver/passenger experience. More conne... » read more

RISC-V Driving New Verification Concepts


Semiconductor Engineering sat down to discuss gaps in tools and why new methodologies are needed for RISC-V processors, with Pete Hardee, group director for product management at Cadence; Mike Eftimakis, vice president for strategy and ecosystem at Codasip; Simon Davidmann, founder and CEO of Imperas Software; Sven Beyer, program manager for processor verification at Siemens EDA; Kiran Vittal, ... » read more

Selecting The Right Root Of Trust For Your Application And Architecture


A Root of Trust is defined as the security foundation for a semiconductor or electronic system. Any secure function performed by the device or system relies in whole or in part on this Root of Trust. Based in hardware, the Root of Trust handles the cryptographic functions, stores and manages cryptographic keys, and is typically part of the secure boot process providing the foundation for the so... » read more

Building Better Cars Faster


Carmakers are accelerating their chip and electronic design schedules to remain competitive in an increasingly fast-changing market, but they are encountering gaps in the tooling, the supply chain, and in the methodologies they use to create those cars. While it's easy to envision how CAD software could be used to create the next new vehicle’s 3-D look, and how simulation software helps de... » read more

Leveraging The Benefits Of A FIPS 140 CMVP Certified Root Of Trust IP


Expectations that security IP designs meet the highest security standards are growing rapidly. As companies face increased product development costs and time pressure, choosing an IP that has been certified demonstrates not just compliance with a standard, but offers a valuable tool to reducing overall project risk. The Federal Information Processing Standard (FIPS) 140 is published by NIST,... » read more

Going Beyond The Requirements Of A Root Of Trust For Measurement With The Silicon-Proven RT-660 Root of Trust


The continuously evolving technology landscape and security requirements for systems present many challenges for device and silicon manufacturers. Nowhere is this truer than in data centers. Rambus has long recognized the need for security designs in data centers, and the Caliptra initiative discussed in this whitepaper is a welcome step towards a widespread adoption of Root of Trust designs i... » read more

Security Solutions In A World Of IoT Devices


Internet of Things (IoT) devices are everywhere these days adding tremendous value, but unfortunately also representing unprecedented levels of risk for exploitation. Anything that is connected to the internet is potentially hackable. Securing connected devices is a challenge and is top of mind for electronics manufacturers who want to avoid the embarrassment of having their devices hacked. The... » read more

← Older posts Newer posts →