Creating A Modular And Versatile State-of-the-Art Cryptographic Subsystem


As the demand for secure, high-performance silicon continues to grow, chipmakers are seeking cryptographic subsystems that are not only robust and efficient but also adaptable to a wide range of use cases. Whether targeting defense electronics, automotive systems, or industrial IoT, customers are looking for solutions that deliver certified, trusted, and future-proof security capabilities. A... » read more

Securing The Road Ahead: MACsec Compliant For Automotive Use


Since the rise of connected and autonomous vehicles, the automotive industry has undergone a significant transformation. Modern vehicles are now equipped with advanced systems that communicate with each other and external infrastructures, enhancing the driving experience. However, this increased connectivity also brings heightened security risks. Unauthorized access to a vehicle’s systems can... » read more

How Secure Are Analog Circuits?


The move toward multi-die assemblies and the increasing value of sensor data at the edge are beginning to focus attention and raise questions about security in analog circuits. In most SoC designs today, security is almost entirely a digital concern. Security requirements in digital circuits are well understood, particularly in large data centers and at the upper end of edge computing, which... » read more

Security Risks Mount For Aerospace, Defense Applications


Supply chain and hardware security vulnerabilities affect all industries, but they pose additional risks for the defense sector. Over-manufacturing and re-manufacturing allow chips from friendly nations to end up in the weapons of adversaries. And side-channel attacks such as power analysis or fault injection, as well as internet-based distributed denial of service (DDoS) attacks, provide a mea... » read more

IoT Security By Design


After years of anticipation and steady uptake, the Internet of Things (IoT) seems poised to cross over into mainstream business use. The percentage of businesses utilizing IoT technologies has risen from 13% in 2014 to approximately 25% today. Global projections indicate that the number of IoT-connected devices is expected to reach 43 billion by 2030, nearly tripling from the figures in 2018. O... » read more

Side-Channel Attacks On Post-Quantum Cryptography


By Mike Hamburg and Bart Stevens Device security requires designers to secure their algorithms, not only against direct attacks on the input and output, but also against side-channel attacks. This requirement is especially notable for cryptographic algorithms, since they have a regular, well-understood structure, and the secrets they process often give access to much more information. Sid... » read more

Security Power Requirements Are Growing


Determining how much power to budget for security in a chip design is a complex calculation. It starts with a risk assessment of the cost of a breach and the number of possible attack vectors, and whether security is active or passive. Different forms of root of trust and cryptography have different power costs. Different systems could require tradeoffs between performance and security, whic... » read more

Controlled Shared Memory For Dynamically Controlling Data Communication Via Shared Memory Approaches (ASU, Intel)


A new technical paper titled "Controlled Shared Memory (COSM) Isolation: Design and Testbed Evaluation" was published by researchers at Arizona State University and Intel Corporation. Abstract "Recent memory sharing approaches, e.g., based on the Compute Express Link (CXL) standard, allow the flexible high-speed sharing of data (i.e., data communication) among multiple hosts. In information... » read more

Secure Handling Of Financial Data In Manufacturing


Experts at the Table: Semiconductor Engineering sat down to discuss the advantages associated with linking financial data with manufacturing data analytic platforms, real security challenges and the best uses for AI/ML methods, with Dieter Rathei, CEO of DR Yield; Jon Holt, senior director of product management at PDF Solutions, Alex Burlak, vice president of advanced analytics and test at p... » read more

Tailoring Root Of Trust Security Capabilities To Specific Customer Needs


The cybersecurity threat landscape is dynamic and rapidly evolving. Indeed, attackers are constantly finding new ways to exploit critical vulnerabilities across a wide range of applications and devices. Protecting data and devices requires secure processes running on systems and networks. A Root of Trust is the foundation on which all secure operations of a computing system depend. It contai... » read more

← Older posts