Chip Failures: Prevention And Responses Over Time


Experts at the Table: Semiconductor Engineering sat down to discuss the causes of chip failures, how to respond to them, and how that can change over time, with Steve Pateras, vice president of marketing and business development at Synopsys; Noam Brousard, vice president of solutions engineering at proteanTecs; Harry Foster, chief verification scientist at Siemens EDA; and Jerome Toublanc, hi... » read more

Accelerating Time To Market For The Software-Defined Vehicle With An Integrated Hardware Security Module Solution


The transformative shift towards the software-defined vehicle (SDV) continues as one of the greatest megatrends shaping the automotive industry. A new era of customer-centric mobility presents data-based revenue opportunities across the automotive value chain and ecosystem. However, this transition also presents many challenges, from managing increasingly complex hardware (HW) and software (SW)... » read more

Secure Interfaces for Critical Semiconductor Applications


Security is now a concern for nearly all semiconductors in nearly all applications. Once of high interest mostly for military and financial systems, both the increasingly connected world and the plethora of existing security threats have changed the landscape dramatically. Every aspect of electronic system design—hardware, firmware, and software—has its own sets of risks and requirements to... » read more

Secure Networking With MACsec, IPsec, And TLS


As digital networks grow in complexity, securing data in transit has become a top priority. Cyber threats, ranging from man-in-the-middle attacks to large-scale data breaches, make strong encryption and authentication mechanisms essential. But network security is not a one-size-fits-all solution. Instead, it operates at different layers of the OSI model, with each layer offering unique protecti... » read more

Certified TRNG For Automotive


In today's tech-driven world, security and safety are more critical than ever, especially in the automotive sector. As cars become smarter and more connected, the need for robust cryptographic mechanisms to safeguard data and ensure secure communications grows. For decades, the automotive industry has been implementing numerous strategies to maintain vehicle safety. But now the industry is star... » read more

Automotive Security Shifts To The System Level


Cars are getting smarter, more complicated, and more vulnerable to cyberattacks. As the amount of semiconductor and software content continues to increase, so does the number of over-the-air updates and connections to edge-based servers and services, adding a variety of new vectors for attacks. Properly securing vehicles requires engineers to first identify all the possible connection points... » read more

Advanced Packaging: A Curse Or A Blessing For Trustworthiness?


In recent years, the issue of trustworthiness in electronics has become increasingly important, especially in areas where security is of the essence such as the automotive sector, industry, and critical infrastructure. These sectors depend on electronic systems that are not only powerful but also absolutely reliable and, above all, secure. This represents a major challenge, as the increasing co... » read more

Cryptography Does Not Equal Security


At Rambus, we often receive RFIs, RFPs and RFQs for security silicon IP cores to be used in our customer’s next semiconductor product. Such requests often contain a long shopping list of required cryptographic algorithms, their modes of operation, their key lengths or strengths and performance and sizing requirements. Depending on the target segment, additional requirements such as robustness... » read more

Edge And IoT Security Turning A Corner


Security is beginning to improve for a wide range of IoT and edge devices due to better tools, the implementation of new standards and methodologies, and an increasing level of collaboration and communication across different market segments that in the past had little or no interaction. Until recently, many vendors in cost-sensitive markets offered the bare minimum of security. To make matt... » read more

Averting Hacks Of PCIe Transport Using CMA/SPDM


This paper describes the component measurement and authentication (CMA) and security protocol and data model (SPDM) flow used to establish the secure channels required for the transmission of encrypted packets. The various approaches, namely the symmetric and asymmetric flows, will be discussed in establishing a secure connection with the implementation of CMA/SPDM packets through data objects.... » read more

← Older posts