Verification And Test Of Safety And Security


Functional verification can cost as much as design, but new capabilities are piling onto an already stressed verification methodology, leaving solutions fragmented and incomplete. In a perfect world, a semiconductor device would be verified to operate according to its complete specification, and continue to operate correctly over the course of its useful life. The reality, however, is this i... » read more

The True Cost Of Software Changes


Safety and security are considered to be important in a growing number of markets and applications. Guidelines are put in place for the processes used to develop either the hardware or the software, but what they seem to ignore is that neither exists in a vacuum. They form a system when put together. Back when I was developing tools for hardware-software co-verification, there were fairly co... » read more

Edge Computing: Four Smart Strategies For Safeguarding Security And User Experience


It is a brave new world for enterprise networks. Smart devices are getting smarter, and edge computing is emerging as a viable way to reduce latency and improve performance. But as network architectures grow increasingly amorphous, what kind of impact will this have on security and performance? Download this white paper to discover how you can boost security, ensure quality of service, and futu... » read more

Minimizing Cybersecurity Risks With ISO/SAE 21434


To mitigate the cybersecurity risk, industry stakeholders have developed the new ISO/SAE 21434 Road Vehicles—Cybersecurity Engineering standard. Industry leaders are quickly adopting ISO/SAE 21434 as the leading approach for cybersecurity. Suppliers such as Renesas announced1 their commitment to ISO/SAE 21434 in October 2021. Recently, NXP2 and Texas Instruments3 both certified their Au... » read more

Post-Quantum Cryptography: The Algorithms That Will Protect Data In The Quantum Era


There is no doubt that quantum computers will play a significant role in helping the world solve complex challenges not possible on current classical computers. However, quantum computers also pose a serious security threat. They will eventually become powerful enough to break traditional asymmetric cryptographic methods, that is, some of the most common security protocols used to protect sensi... » read more

Security Becomes Much Bigger Issue For AI/ML Chips, Tools


Security is becoming a bigger issue in AI and machine learning chips, in part because the chip industry is racing just to get new devices working, and in part because it's difficult to secure a new technology that is expected to adapt over time. And unlike in the past, when tools and methodologies were relatively fixed, nearly everything is in motion. Algorithms are being changed, EDA tools ... » read more

Improving Network Security Threat Detection


Collecting security-related information is one thing. Getting the most benefit from that data is another. Security analysts get lots of alerts from their security tools. This forces them to prioritize the ones that will get investigated. When additional context is added to the security data, it makes it easier to see what traffic needs a closer look. For instance, discovery, forensics, and reme... » read more

Chips Getting More Secure, But Not Quickly Enough


Experts at the Table: Semiconductor Engineering sat down to talk about the impact of heterogeneous integration, more advanced RISC-V designs, and a growing awareness of security threats, with Mike Borza, Synopsys scientist; John Hallman, product manager for trust and security at Siemens EDA; Pete Hardee, group director for product management at Cadence; Paul Karazuba, vice president of marketin... » read more

Making It Easier To Build Platforms That Support Confidential Computing


With the rise of the cloud, computation has become highly distributed. Workloads can be running on many compute nodes and often span multiple data centers. A workload consists of a combination of code and data, and both are often valuable and sensitive. A data center is often managed by a third-party, such as Cloud Service Provider (CSP), and may reside in a different legal jurisdiction to the ... » read more

Research Bits: May 10


Growing 2D TMDs on chips Researchers from Massachusetts Institute of Technology (MIT), Oak Ridge National Laboratory, and Ericsson Research found a way to “grow” layers of 2D transition metal dichalcogenide (TMD) materials directly on top of a fully fabricated silicon chip, a technique they say could enable denser integrations. The researchers focused on molybdenum disulfide, which is f... » read more

← Older posts Newer posts →