10Base-T1S Ethernet And The Use Of MACsec For Link Security


10Base-T1S (henceforth in this blog referred to as T1S) is a relatively new standard for a 10Mbit/s single-pair Ethernet over an unshielded, single-twisted pair that was introduced with the IEEE 802.3cg-2019 specification. It brings Ethernet technology into the low-cost, edge applications space, enabling connection of “edge nodes” (remote sensors, actuators, light controls, etc.) to a “he... » read more

NVIDIA GPU Confidential Computing: Threat Model And Security Insights (IBM Research, Ohio State)


A new technical paper titled "NVIDIA GPU Confidential Computing Demystified" was published by IBM Research and Ohio State University. Abstract "GPU Confidential Computing (GPU-CC) was introduced as part of the NVIDIA Hopper Architecture, extending the trust boundary beyond traditional CPU-based confidential computing. This innovation enables GPUs to securely process AI workloads, providing ... » read more

Redefining SoC Design: The Shift To Secure Chiplet-Based Architectures


The semiconductor industry is undergoing a paradigm shift from monolithic system-on-chip (SoC) architectures to modular, chiplet-based designs. This transformation is driven by escalating design complexity, soaring fabrication costs, and the relentless pursuit of efficiency. However, as chiplet adoption accelerates, security becomes a critical concern, requiring robust measures to protect data,... » read more

Creating A Modular And Versatile State-of-the-Art Cryptographic Subsystem


As the demand for secure, high-performance silicon continues to grow, chipmakers are seeking cryptographic subsystems that are not only robust and efficient but also adaptable to a wide range of use cases. Whether targeting defense electronics, automotive systems, or industrial IoT, customers are looking for solutions that deliver certified, trusted, and future-proof security capabilities. A... » read more

Securing The Road Ahead: MACsec Compliant For Automotive Use


Since the rise of connected and autonomous vehicles, the automotive industry has undergone a significant transformation. Modern vehicles are now equipped with advanced systems that communicate with each other and external infrastructures, enhancing the driving experience. However, this increased connectivity also brings heightened security risks. Unauthorized access to a vehicle’s systems can... » read more

How Secure Are Analog Circuits?


The move toward multi-die assemblies and the increasing value of sensor data at the edge are beginning to focus attention and raise questions about security in analog circuits. In most SoC designs today, security is almost entirely a digital concern. Security requirements in digital circuits are well understood, particularly in large data centers and at the upper end of edge computing, which... » read more

Security Risks Mount For Aerospace, Defense Applications


Supply chain and hardware security vulnerabilities affect all industries, but they pose additional risks for the defense sector. Over-manufacturing and re-manufacturing allow chips from friendly nations to end up in the weapons of adversaries. And side-channel attacks such as power analysis or fault injection, as well as internet-based distributed denial of service (DDoS) attacks, provide a mea... » read more

IoT Security By Design


After years of anticipation and steady uptake, the Internet of Things (IoT) seems poised to cross over into mainstream business use. The percentage of businesses utilizing IoT technologies has risen from 13% in 2014 to approximately 25% today. Global projections indicate that the number of IoT-connected devices is expected to reach 43 billion by 2030, nearly tripling from the figures in 2018. O... » read more

Side-Channel Attacks On Post-Quantum Cryptography


By Mike Hamburg and Bart Stevens Device security requires designers to secure their algorithms, not only against direct attacks on the input and output, but also against side-channel attacks. This requirement is especially notable for cryptographic algorithms, since they have a regular, well-understood structure, and the secrets they process often give access to much more information. Sid... » read more

Security Power Requirements Are Growing


Determining how much power to budget for security in a chip design is a complex calculation. It starts with a risk assessment of the cost of a breach and the number of possible attack vectors, and whether security is active or passive. Different forms of root of trust and cryptography have different power costs. Different systems could require tradeoffs between performance and security, whic... » read more

← Older posts