Tailoring Root Of Trust Security Capabilities To Specific Customer Needs


The cybersecurity threat landscape is dynamic and rapidly evolving. Indeed, attackers are constantly finding new ways to exploit critical vulnerabilities across a wide range of applications and devices. Protecting data and devices requires secure processes running on systems and networks. A Root of Trust is the foundation on which all secure operations of a computing system depend. It contai... » read more

Auto Sector Leads The Way In IC Security


Concerns about chip and system security are beginning to bear fruit in some markets, driven by the overlap in safety and security in automotive applications and the growing value of algorithms and complex systems in others. But how and when that security is implemented is still all over the map, and so is its effectiveness. The reasons are as nuanced as the designs themselves, which makes it... » read more

Chip Aging Opens Up New Attack Vectors


The longer a piece of silicon is out in the field the more prone it becomes to a cyberattack, raising questions about the optimal longevity of circuits and the impact of extending their lifetimes. This is particularly challenging for safety- and mission-critical applications, where the cost of development can run as high as $100 million for some of the most complex designs. Chipmakers want t... » read more

Chip Failures: Prevention And Responses Over Time


Experts at the Table: Semiconductor Engineering sat down to discuss the causes of chip failures, how to respond to them, and how that can change over time, with Steve Pateras, vice president of marketing and business development at Synopsys; Noam Brousard, vice president of solutions engineering at proteanTecs; Harry Foster, chief verification scientist at Siemens EDA; and Jerome Toublanc, hi... » read more

Accelerating Time To Market For The Software-Defined Vehicle With An Integrated Hardware Security Module Solution


The transformative shift towards the software-defined vehicle (SDV) continues as one of the greatest megatrends shaping the automotive industry. A new era of customer-centric mobility presents data-based revenue opportunities across the automotive value chain and ecosystem. However, this transition also presents many challenges, from managing increasingly complex hardware (HW) and software (SW)... » read more

Secure Interfaces for Critical Semiconductor Applications


Security is now a concern for nearly all semiconductors in nearly all applications. Once of high interest mostly for military and financial systems, both the increasingly connected world and the plethora of existing security threats have changed the landscape dramatically. Every aspect of electronic system design—hardware, firmware, and software—has its own sets of risks and requirements to... » read more

Secure Networking With MACsec, IPsec, And TLS


As digital networks grow in complexity, securing data in transit has become a top priority. Cyber threats, ranging from man-in-the-middle attacks to large-scale data breaches, make strong encryption and authentication mechanisms essential. But network security is not a one-size-fits-all solution. Instead, it operates at different layers of the OSI model, with each layer offering unique protecti... » read more

Certified TRNG For Automotive


In today's tech-driven world, security and safety are more critical than ever, especially in the automotive sector. As cars become smarter and more connected, the need for robust cryptographic mechanisms to safeguard data and ensure secure communications grows. For decades, the automotive industry has been implementing numerous strategies to maintain vehicle safety. But now the industry is star... » read more

Automotive Security Shifts To The System Level


Cars are getting smarter, more complicated, and more vulnerable to cyberattacks. As the amount of semiconductor and software content continues to increase, so does the number of over-the-air updates and connections to edge-based servers and services, adding a variety of new vectors for attacks. Properly securing vehicles requires engineers to first identify all the possible connection points... » read more

Advanced Packaging: A Curse Or A Blessing For Trustworthiness?


In recent years, the issue of trustworthiness in electronics has become increasingly important, especially in areas where security is of the essence such as the automotive sector, industry, and critical infrastructure. These sectors depend on electronic systems that are not only powerful but also absolutely reliable and, above all, secure. This represents a major challenge, as the increasing co... » read more

← Older posts